Nov 27 19:01:28 localhost kernel: Linux version 5.14.0-642.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-68.el9) #1 SMP PREEMPT_DYNAMIC Thu Nov 20 14:15:03 UTC 2025 Nov 27 19:01:28 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Nov 27 19:01:28 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-642.el9.x86_64 root=UUID=b277050f-8ace-464d-abb6-4c46d4c45253 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Nov 27 19:01:28 localhost kernel: BIOS-provided physical RAM map: Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 27 19:01:28 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Nov 27 19:01:28 localhost kernel: NX (Execute Disable) protection: active Nov 27 19:01:28 localhost kernel: APIC: Static calls initialized Nov 27 19:01:28 localhost kernel: SMBIOS 2.8 present. Nov 27 19:01:28 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Nov 27 19:01:28 localhost kernel: Hypervisor detected: KVM Nov 27 19:01:28 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 27 19:01:28 localhost kernel: kvm-clock: using sched offset of 3269227606 cycles Nov 27 19:01:28 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 27 19:01:28 localhost kernel: tsc: Detected 2799.998 MHz processor Nov 27 19:01:28 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 27 19:01:28 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 27 19:01:28 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Nov 27 19:01:28 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Nov 27 19:01:28 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 27 19:01:28 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Nov 27 19:01:28 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Nov 27 19:01:28 localhost kernel: Using GB pages for direct mapping Nov 27 19:01:28 localhost kernel: RAMDISK: [mem 0x2d83a000-0x32c14fff] Nov 27 19:01:28 localhost kernel: ACPI: Early table checksum verification disabled Nov 27 19:01:28 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Nov 27 19:01:28 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 27 19:01:28 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 27 19:01:28 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 27 19:01:28 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Nov 27 19:01:28 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 27 19:01:28 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 27 19:01:28 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Nov 27 19:01:28 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Nov 27 19:01:28 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Nov 27 19:01:28 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Nov 27 19:01:28 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Nov 27 19:01:28 localhost kernel: No NUMA configuration found Nov 27 19:01:28 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Nov 27 19:01:28 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd3000-0x23fffdfff] Nov 27 19:01:28 localhost kernel: crashkernel reserved: 0x00000000a0000000 - 0x00000000b0000000 (256 MB) Nov 27 19:01:28 localhost kernel: Zone ranges: Nov 27 19:01:28 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 27 19:01:28 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Nov 27 19:01:28 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Nov 27 19:01:28 localhost kernel: Device empty Nov 27 19:01:28 localhost kernel: Movable zone start for each node Nov 27 19:01:28 localhost kernel: Early memory node ranges Nov 27 19:01:28 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 27 19:01:28 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Nov 27 19:01:28 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Nov 27 19:01:28 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Nov 27 19:01:28 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 27 19:01:28 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Nov 27 19:01:28 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Nov 27 19:01:28 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Nov 27 19:01:28 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 27 19:01:28 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 27 19:01:28 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 27 19:01:28 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 27 19:01:28 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 27 19:01:28 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 27 19:01:28 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 27 19:01:28 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 27 19:01:28 localhost kernel: TSC deadline timer available Nov 27 19:01:28 localhost kernel: CPU topo: Max. logical packages: 8 Nov 27 19:01:28 localhost kernel: CPU topo: Max. logical dies: 8 Nov 27 19:01:28 localhost kernel: CPU topo: Max. dies per package: 1 Nov 27 19:01:28 localhost kernel: CPU topo: Max. threads per core: 1 Nov 27 19:01:28 localhost kernel: CPU topo: Num. cores per package: 1 Nov 27 19:01:28 localhost kernel: CPU topo: Num. threads per package: 1 Nov 27 19:01:28 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Nov 27 19:01:28 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Nov 27 19:01:28 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Nov 27 19:01:28 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Nov 27 19:01:28 localhost kernel: Booting paravirtualized kernel on KVM Nov 27 19:01:28 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 27 19:01:28 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Nov 27 19:01:28 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Nov 27 19:01:28 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Nov 27 19:01:28 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Nov 27 19:01:28 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Nov 27 19:01:28 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-642.el9.x86_64 root=UUID=b277050f-8ace-464d-abb6-4c46d4c45253 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Nov 27 19:01:28 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-642.el9.x86_64", will be passed to user space. Nov 27 19:01:28 localhost kernel: random: crng init done Nov 27 19:01:28 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Nov 27 19:01:28 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Nov 27 19:01:28 localhost kernel: Fallback order for Node 0: 0 Nov 27 19:01:28 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Nov 27 19:01:28 localhost kernel: Policy zone: Normal Nov 27 19:01:28 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 27 19:01:28 localhost kernel: software IO TLB: area num 8. Nov 27 19:01:28 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Nov 27 19:01:28 localhost kernel: ftrace: allocating 49313 entries in 193 pages Nov 27 19:01:28 localhost kernel: ftrace: allocated 193 pages with 3 groups Nov 27 19:01:28 localhost kernel: Dynamic Preempt: voluntary Nov 27 19:01:28 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Nov 27 19:01:28 localhost kernel: rcu: RCU event tracing is enabled. Nov 27 19:01:28 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Nov 27 19:01:28 localhost kernel: Trampoline variant of Tasks RCU enabled. Nov 27 19:01:28 localhost kernel: Rude variant of Tasks RCU enabled. Nov 27 19:01:28 localhost kernel: Tracing variant of Tasks RCU enabled. Nov 27 19:01:28 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 27 19:01:28 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Nov 27 19:01:28 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Nov 27 19:01:28 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Nov 27 19:01:28 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Nov 27 19:01:28 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Nov 27 19:01:28 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Nov 27 19:01:28 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Nov 27 19:01:28 localhost kernel: Console: colour VGA+ 80x25 Nov 27 19:01:28 localhost kernel: printk: console [ttyS0] enabled Nov 27 19:01:28 localhost kernel: ACPI: Core revision 20230331 Nov 27 19:01:28 localhost kernel: APIC: Switch to symmetric I/O mode setup Nov 27 19:01:28 localhost kernel: x2apic enabled Nov 27 19:01:28 localhost kernel: APIC: Switched APIC routing to: physical x2apic Nov 27 19:01:28 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Nov 27 19:01:28 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Nov 27 19:01:28 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Nov 27 19:01:28 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Nov 27 19:01:28 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Nov 27 19:01:28 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 27 19:01:28 localhost kernel: Spectre V2 : Mitigation: Retpolines Nov 27 19:01:28 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Nov 27 19:01:28 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Nov 27 19:01:28 localhost kernel: RETBleed: Mitigation: untrained return thunk Nov 27 19:01:28 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 27 19:01:28 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Nov 27 19:01:28 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Nov 27 19:01:28 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Nov 27 19:01:28 localhost kernel: x86/bugs: return thunk changed Nov 27 19:01:28 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Nov 27 19:01:28 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 27 19:01:28 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 27 19:01:28 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 27 19:01:28 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 27 19:01:28 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Nov 27 19:01:28 localhost kernel: Freeing SMP alternatives memory: 40K Nov 27 19:01:28 localhost kernel: pid_max: default: 32768 minimum: 301 Nov 27 19:01:28 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Nov 27 19:01:28 localhost kernel: landlock: Up and running. Nov 27 19:01:28 localhost kernel: Yama: becoming mindful. Nov 27 19:01:28 localhost kernel: SELinux: Initializing. Nov 27 19:01:28 localhost kernel: LSM support for eBPF active Nov 27 19:01:28 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 27 19:01:28 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 27 19:01:28 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Nov 27 19:01:28 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Nov 27 19:01:28 localhost kernel: ... version: 0 Nov 27 19:01:28 localhost kernel: ... bit width: 48 Nov 27 19:01:28 localhost kernel: ... generic registers: 6 Nov 27 19:01:28 localhost kernel: ... value mask: 0000ffffffffffff Nov 27 19:01:28 localhost kernel: ... max period: 00007fffffffffff Nov 27 19:01:28 localhost kernel: ... fixed-purpose events: 0 Nov 27 19:01:28 localhost kernel: ... event mask: 000000000000003f Nov 27 19:01:28 localhost kernel: signal: max sigframe size: 1776 Nov 27 19:01:28 localhost kernel: rcu: Hierarchical SRCU implementation. Nov 27 19:01:28 localhost kernel: rcu: Max phase no-delay instances is 400. Nov 27 19:01:28 localhost kernel: smp: Bringing up secondary CPUs ... Nov 27 19:01:28 localhost kernel: smpboot: x86: Booting SMP configuration: Nov 27 19:01:28 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Nov 27 19:01:28 localhost kernel: smp: Brought up 1 node, 8 CPUs Nov 27 19:01:28 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Nov 27 19:01:28 localhost kernel: node 0 deferred pages initialised in 10ms Nov 27 19:01:28 localhost kernel: Memory: 7765492K/8388068K available (16384K kernel code, 5787K rwdata, 13900K rodata, 4192K init, 7172K bss, 616276K reserved, 0K cma-reserved) Nov 27 19:01:28 localhost kernel: devtmpfs: initialized Nov 27 19:01:28 localhost kernel: x86/mm: Memory block size: 128MB Nov 27 19:01:28 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 27 19:01:28 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Nov 27 19:01:28 localhost kernel: pinctrl core: initialized pinctrl subsystem Nov 27 19:01:28 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 27 19:01:28 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Nov 27 19:01:28 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Nov 27 19:01:28 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Nov 27 19:01:28 localhost kernel: audit: initializing netlink subsys (disabled) Nov 27 19:01:28 localhost kernel: audit: type=2000 audit(1764288086.428:1): state=initialized audit_enabled=0 res=1 Nov 27 19:01:28 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Nov 27 19:01:28 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 27 19:01:28 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Nov 27 19:01:28 localhost kernel: cpuidle: using governor menu Nov 27 19:01:28 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 27 19:01:28 localhost kernel: PCI: Using configuration type 1 for base access Nov 27 19:01:28 localhost kernel: PCI: Using configuration type 1 for extended access Nov 27 19:01:28 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 27 19:01:28 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Nov 27 19:01:28 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Nov 27 19:01:28 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Nov 27 19:01:28 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Nov 27 19:01:28 localhost kernel: Demotion targets for Node 0: null Nov 27 19:01:28 localhost kernel: cryptd: max_cpu_qlen set to 1000 Nov 27 19:01:28 localhost kernel: ACPI: Added _OSI(Module Device) Nov 27 19:01:28 localhost kernel: ACPI: Added _OSI(Processor Device) Nov 27 19:01:28 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Nov 27 19:01:28 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 27 19:01:28 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 27 19:01:28 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Nov 27 19:01:28 localhost kernel: ACPI: Interpreter enabled Nov 27 19:01:28 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Nov 27 19:01:28 localhost kernel: ACPI: Using IOAPIC for interrupt routing Nov 27 19:01:28 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 27 19:01:28 localhost kernel: PCI: Using E820 reservations for host bridge windows Nov 27 19:01:28 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 27 19:01:28 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 27 19:01:28 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Nov 27 19:01:28 localhost kernel: acpiphp: Slot [3] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [4] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [5] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [6] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [7] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [8] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [9] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [10] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [11] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [12] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [13] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [14] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [15] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [16] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [17] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [18] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [19] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [20] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [21] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [22] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [23] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [24] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [25] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [26] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [27] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [28] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [29] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [30] registered Nov 27 19:01:28 localhost kernel: acpiphp: Slot [31] registered Nov 27 19:01:28 localhost kernel: PCI host bridge to bus 0000:00 Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 27 19:01:28 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Nov 27 19:01:28 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Nov 27 19:01:28 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Nov 27 19:01:28 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Nov 27 19:01:28 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 27 19:01:28 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Nov 27 19:01:28 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Nov 27 19:01:28 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Nov 27 19:01:28 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Nov 27 19:01:28 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Nov 27 19:01:28 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Nov 27 19:01:28 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Nov 27 19:01:28 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Nov 27 19:01:28 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Nov 27 19:01:28 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 27 19:01:28 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 27 19:01:28 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 27 19:01:28 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 27 19:01:28 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Nov 27 19:01:28 localhost kernel: iommu: Default domain type: Translated Nov 27 19:01:28 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 27 19:01:28 localhost kernel: SCSI subsystem initialized Nov 27 19:01:28 localhost kernel: ACPI: bus type USB registered Nov 27 19:01:28 localhost kernel: usbcore: registered new interface driver usbfs Nov 27 19:01:28 localhost kernel: usbcore: registered new interface driver hub Nov 27 19:01:28 localhost kernel: usbcore: registered new device driver usb Nov 27 19:01:28 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Nov 27 19:01:28 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 27 19:01:28 localhost kernel: PTP clock support registered Nov 27 19:01:28 localhost kernel: EDAC MC: Ver: 3.0.0 Nov 27 19:01:28 localhost kernel: NetLabel: Initializing Nov 27 19:01:28 localhost kernel: NetLabel: domain hash size = 128 Nov 27 19:01:28 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Nov 27 19:01:28 localhost kernel: NetLabel: unlabeled traffic allowed by default Nov 27 19:01:28 localhost kernel: PCI: Using ACPI for IRQ routing Nov 27 19:01:28 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Nov 27 19:01:28 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Nov 27 19:01:28 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Nov 27 19:01:28 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 27 19:01:28 localhost kernel: vgaarb: loaded Nov 27 19:01:28 localhost kernel: clocksource: Switched to clocksource kvm-clock Nov 27 19:01:28 localhost kernel: VFS: Disk quotas dquot_6.6.0 Nov 27 19:01:28 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 27 19:01:28 localhost kernel: pnp: PnP ACPI init Nov 27 19:01:28 localhost kernel: pnp 00:03: [dma 2] Nov 27 19:01:28 localhost kernel: pnp: PnP ACPI: found 5 devices Nov 27 19:01:28 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 27 19:01:28 localhost kernel: NET: Registered PF_INET protocol family Nov 27 19:01:28 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 27 19:01:28 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Nov 27 19:01:28 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 27 19:01:28 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 27 19:01:28 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Nov 27 19:01:28 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Nov 27 19:01:28 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Nov 27 19:01:28 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Nov 27 19:01:28 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Nov 27 19:01:28 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 27 19:01:28 localhost kernel: NET: Registered PF_XDP protocol family Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Nov 27 19:01:28 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Nov 27 19:01:28 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Nov 27 19:01:28 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 27 19:01:28 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Nov 27 19:01:28 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 97030 usecs Nov 27 19:01:28 localhost kernel: PCI: CLS 0 bytes, default 64 Nov 27 19:01:28 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Nov 27 19:01:28 localhost kernel: software IO TLB: mapped [mem 0x00000000bbfdb000-0x00000000bffdb000] (64MB) Nov 27 19:01:28 localhost kernel: ACPI: bus type thunderbolt registered Nov 27 19:01:28 localhost kernel: Trying to unpack rootfs image as initramfs... Nov 27 19:01:28 localhost kernel: Initialise system trusted keyrings Nov 27 19:01:28 localhost kernel: Key type blacklist registered Nov 27 19:01:28 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Nov 27 19:01:28 localhost kernel: zbud: loaded Nov 27 19:01:28 localhost kernel: integrity: Platform Keyring initialized Nov 27 19:01:28 localhost kernel: integrity: Machine keyring initialized Nov 27 19:01:28 localhost kernel: Freeing initrd memory: 85868K Nov 27 19:01:28 localhost kernel: NET: Registered PF_ALG protocol family Nov 27 19:01:28 localhost kernel: xor: automatically using best checksumming function avx Nov 27 19:01:28 localhost kernel: Key type asymmetric registered Nov 27 19:01:28 localhost kernel: Asymmetric key parser 'x509' registered Nov 27 19:01:28 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Nov 27 19:01:28 localhost kernel: io scheduler mq-deadline registered Nov 27 19:01:28 localhost kernel: io scheduler kyber registered Nov 27 19:01:28 localhost kernel: io scheduler bfq registered Nov 27 19:01:28 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Nov 27 19:01:28 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Nov 27 19:01:28 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Nov 27 19:01:28 localhost kernel: ACPI: button: Power Button [PWRF] Nov 27 19:01:28 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Nov 27 19:01:28 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Nov 27 19:01:28 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Nov 27 19:01:28 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 27 19:01:28 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 27 19:01:28 localhost kernel: Non-volatile memory driver v1.3 Nov 27 19:01:28 localhost kernel: rdac: device handler registered Nov 27 19:01:28 localhost kernel: hp_sw: device handler registered Nov 27 19:01:28 localhost kernel: emc: device handler registered Nov 27 19:01:28 localhost kernel: alua: device handler registered Nov 27 19:01:28 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Nov 27 19:01:28 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Nov 27 19:01:28 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Nov 27 19:01:28 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Nov 27 19:01:28 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Nov 27 19:01:28 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Nov 27 19:01:28 localhost kernel: usb usb1: Product: UHCI Host Controller Nov 27 19:01:28 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-642.el9.x86_64 uhci_hcd Nov 27 19:01:28 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Nov 27 19:01:28 localhost kernel: hub 1-0:1.0: USB hub found Nov 27 19:01:28 localhost kernel: hub 1-0:1.0: 2 ports detected Nov 27 19:01:28 localhost kernel: usbcore: registered new interface driver usbserial_generic Nov 27 19:01:28 localhost kernel: usbserial: USB Serial support registered for generic Nov 27 19:01:28 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 27 19:01:28 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 27 19:01:28 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 27 19:01:28 localhost kernel: mousedev: PS/2 mouse device common for all mice Nov 27 19:01:28 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Nov 27 19:01:28 localhost kernel: rtc_cmos 00:04: registered as rtc0 Nov 27 19:01:28 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Nov 27 19:01:28 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-11-28T00:01:27 UTC (1764288087) Nov 27 19:01:28 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Nov 27 19:01:28 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Nov 27 19:01:28 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Nov 27 19:01:28 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Nov 27 19:01:28 localhost kernel: usbcore: registered new interface driver usbhid Nov 27 19:01:28 localhost kernel: usbhid: USB HID core driver Nov 27 19:01:28 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Nov 27 19:01:28 localhost kernel: drop_monitor: Initializing network drop monitor service Nov 27 19:01:28 localhost kernel: Initializing XFRM netlink socket Nov 27 19:01:28 localhost kernel: NET: Registered PF_INET6 protocol family Nov 27 19:01:28 localhost kernel: Segment Routing with IPv6 Nov 27 19:01:28 localhost kernel: NET: Registered PF_PACKET protocol family Nov 27 19:01:28 localhost kernel: mpls_gso: MPLS GSO support Nov 27 19:01:28 localhost kernel: IPI shorthand broadcast: enabled Nov 27 19:01:28 localhost kernel: AVX2 version of gcm_enc/dec engaged. Nov 27 19:01:28 localhost kernel: AES CTR mode by8 optimization enabled Nov 27 19:01:28 localhost kernel: sched_clock: Marking stable (1307001676, 142585321)->(1525833935, -76246938) Nov 27 19:01:28 localhost kernel: registered taskstats version 1 Nov 27 19:01:28 localhost kernel: Loading compiled-in X.509 certificates Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 8ec4bd273f582f9a9b9a494ae677ca1f1488f19e' Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Nov 27 19:01:28 localhost kernel: Demotion targets for Node 0: null Nov 27 19:01:28 localhost kernel: page_owner is disabled Nov 27 19:01:28 localhost kernel: Key type .fscrypt registered Nov 27 19:01:28 localhost kernel: Key type fscrypt-provisioning registered Nov 27 19:01:28 localhost kernel: Key type big_key registered Nov 27 19:01:28 localhost kernel: Key type encrypted registered Nov 27 19:01:28 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Nov 27 19:01:28 localhost kernel: Loading compiled-in module X.509 certificates Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 8ec4bd273f582f9a9b9a494ae677ca1f1488f19e' Nov 27 19:01:28 localhost kernel: ima: Allocated hash algorithm: sha256 Nov 27 19:01:28 localhost kernel: ima: No architecture policies found Nov 27 19:01:28 localhost kernel: evm: Initialising EVM extended attributes: Nov 27 19:01:28 localhost kernel: evm: security.selinux Nov 27 19:01:28 localhost kernel: evm: security.SMACK64 (disabled) Nov 27 19:01:28 localhost kernel: evm: security.SMACK64EXEC (disabled) Nov 27 19:01:28 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Nov 27 19:01:28 localhost kernel: evm: security.SMACK64MMAP (disabled) Nov 27 19:01:28 localhost kernel: evm: security.apparmor (disabled) Nov 27 19:01:28 localhost kernel: evm: security.ima Nov 27 19:01:28 localhost kernel: evm: security.capability Nov 27 19:01:28 localhost kernel: evm: HMAC attrs: 0x1 Nov 27 19:01:28 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Nov 27 19:01:28 localhost kernel: Running certificate verification RSA selftest Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Nov 27 19:01:28 localhost kernel: Running certificate verification ECDSA selftest Nov 27 19:01:28 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Nov 27 19:01:28 localhost kernel: clk: Disabling unused clocks Nov 27 19:01:28 localhost kernel: Freeing unused decrypted memory: 2028K Nov 27 19:01:28 localhost kernel: Freeing unused kernel image (initmem) memory: 4192K Nov 27 19:01:28 localhost kernel: Write protecting the kernel read-only data: 30720k Nov 27 19:01:28 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 436K Nov 27 19:01:28 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 27 19:01:28 localhost kernel: Run /init as init process Nov 27 19:01:28 localhost kernel: with arguments: Nov 27 19:01:28 localhost kernel: /init Nov 27 19:01:28 localhost kernel: with environment: Nov 27 19:01:28 localhost kernel: HOME=/ Nov 27 19:01:28 localhost kernel: TERM=linux Nov 27 19:01:28 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-642.el9.x86_64 Nov 27 19:01:28 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 27 19:01:28 localhost systemd[1]: Detected virtualization kvm. Nov 27 19:01:28 localhost systemd[1]: Detected architecture x86-64. Nov 27 19:01:28 localhost systemd[1]: Running in initrd. Nov 27 19:01:28 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Nov 27 19:01:28 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Nov 27 19:01:28 localhost kernel: usb 1-1: Product: QEMU USB Tablet Nov 27 19:01:28 localhost kernel: usb 1-1: Manufacturer: QEMU Nov 27 19:01:28 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Nov 27 19:01:28 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Nov 27 19:01:28 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Nov 27 19:01:28 localhost systemd[1]: No hostname configured, using default hostname. Nov 27 19:01:28 localhost systemd[1]: Hostname set to . Nov 27 19:01:28 localhost systemd[1]: Initializing machine ID from VM UUID. Nov 27 19:01:28 localhost systemd[1]: Queued start job for default target Initrd Default Target. Nov 27 19:01:28 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Nov 27 19:01:28 localhost systemd[1]: Reached target Local Encrypted Volumes. Nov 27 19:01:28 localhost systemd[1]: Reached target Initrd /usr File System. Nov 27 19:01:28 localhost systemd[1]: Reached target Local File Systems. Nov 27 19:01:28 localhost systemd[1]: Reached target Path Units. Nov 27 19:01:28 localhost systemd[1]: Reached target Slice Units. Nov 27 19:01:28 localhost systemd[1]: Reached target Swaps. Nov 27 19:01:28 localhost systemd[1]: Reached target Timer Units. Nov 27 19:01:28 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 27 19:01:28 localhost systemd[1]: Listening on Journal Socket (/dev/log). Nov 27 19:01:28 localhost systemd[1]: Listening on Journal Socket. Nov 27 19:01:28 localhost systemd[1]: Listening on udev Control Socket. Nov 27 19:01:28 localhost systemd[1]: Listening on udev Kernel Socket. Nov 27 19:01:28 localhost systemd[1]: Reached target Socket Units. Nov 27 19:01:28 localhost systemd[1]: Starting Create List of Static Device Nodes... Nov 27 19:01:28 localhost systemd[1]: Starting Journal Service... Nov 27 19:01:28 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Nov 27 19:01:28 localhost systemd[1]: Starting Apply Kernel Variables... Nov 27 19:01:28 localhost systemd[1]: Starting Create System Users... Nov 27 19:01:28 localhost systemd[1]: Starting Setup Virtual Console... Nov 27 19:01:28 localhost systemd[1]: Finished Create List of Static Device Nodes. Nov 27 19:01:28 localhost systemd[1]: Finished Apply Kernel Variables. Nov 27 19:01:28 localhost systemd[1]: Finished Create System Users. Nov 27 19:01:28 localhost systemd-journald[307]: Journal started Nov 27 19:01:28 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/db7657deaf5e4bf1a2596c444d17d53b) is 8.0M, max 153.6M, 145.6M free. Nov 27 19:01:28 localhost systemd-sysusers[312]: Creating group 'users' with GID 100. Nov 27 19:01:28 localhost systemd-sysusers[312]: Creating group 'dbus' with GID 81. Nov 27 19:01:28 localhost systemd-sysusers[312]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Nov 27 19:01:28 localhost systemd[1]: Started Journal Service. Nov 27 19:01:28 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Nov 27 19:01:28 localhost systemd[1]: Starting Create Volatile Files and Directories... Nov 27 19:01:28 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Nov 27 19:01:28 localhost systemd[1]: Finished Create Volatile Files and Directories. Nov 27 19:01:28 localhost systemd[1]: Finished Setup Virtual Console. Nov 27 19:01:28 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Nov 27 19:01:28 localhost systemd[1]: Starting dracut cmdline hook... Nov 27 19:01:28 localhost dracut-cmdline[326]: dracut-9 dracut-057-102.git20250818.el9 Nov 27 19:01:28 localhost dracut-cmdline[326]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-642.el9.x86_64 root=UUID=b277050f-8ace-464d-abb6-4c46d4c45253 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Nov 27 19:01:28 localhost systemd[1]: Finished dracut cmdline hook. Nov 27 19:01:28 localhost systemd[1]: Starting dracut pre-udev hook... Nov 27 19:01:28 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 27 19:01:28 localhost kernel: device-mapper: uevent: version 1.0.3 Nov 27 19:01:28 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Nov 27 19:01:28 localhost kernel: RPC: Registered named UNIX socket transport module. Nov 27 19:01:28 localhost kernel: RPC: Registered udp transport module. Nov 27 19:01:28 localhost kernel: RPC: Registered tcp transport module. Nov 27 19:01:28 localhost kernel: RPC: Registered tcp-with-tls transport module. Nov 27 19:01:28 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 27 19:01:28 localhost rpc.statd[441]: Version 2.5.4 starting Nov 27 19:01:28 localhost rpc.statd[441]: Initializing NSM state Nov 27 19:01:29 localhost rpc.idmapd[446]: Setting log level to 0 Nov 27 19:01:29 localhost systemd[1]: Finished dracut pre-udev hook. Nov 27 19:01:29 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Nov 27 19:01:29 localhost systemd-udevd[459]: Using default interface naming scheme 'rhel-9.0'. Nov 27 19:01:29 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Nov 27 19:01:29 localhost systemd[1]: Starting dracut pre-trigger hook... Nov 27 19:01:29 localhost systemd[1]: Finished dracut pre-trigger hook. Nov 27 19:01:29 localhost systemd[1]: Starting Coldplug All udev Devices... Nov 27 19:01:29 localhost systemd[1]: Created slice Slice /system/modprobe. Nov 27 19:01:29 localhost systemd[1]: Starting Load Kernel Module configfs... Nov 27 19:01:29 localhost systemd[1]: Finished Coldplug All udev Devices. Nov 27 19:01:29 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 27 19:01:29 localhost systemd[1]: Finished Load Kernel Module configfs. Nov 27 19:01:29 localhost systemd[1]: Mounting Kernel Configuration File System... Nov 27 19:01:29 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Nov 27 19:01:29 localhost systemd[1]: Reached target Network. Nov 27 19:01:29 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Nov 27 19:01:29 localhost systemd[1]: Starting dracut initqueue hook... Nov 27 19:01:29 localhost systemd[1]: Mounted Kernel Configuration File System. Nov 27 19:01:29 localhost systemd[1]: Reached target System Initialization. Nov 27 19:01:29 localhost systemd[1]: Reached target Basic System. Nov 27 19:01:29 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Nov 27 19:01:29 localhost kernel: libata version 3.00 loaded. Nov 27 19:01:29 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Nov 27 19:01:29 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Nov 27 19:01:29 localhost kernel: scsi host0: ata_piix Nov 27 19:01:29 localhost kernel: scsi host1: ata_piix Nov 27 19:01:29 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Nov 27 19:01:29 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Nov 27 19:01:29 localhost kernel: vda: vda1 Nov 27 19:01:29 localhost systemd-udevd[496]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:01:29 localhost kernel: ata1: found unknown device (class 0) Nov 27 19:01:29 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Nov 27 19:01:29 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Nov 27 19:01:29 localhost systemd[1]: Found device /dev/disk/by-uuid/b277050f-8ace-464d-abb6-4c46d4c45253. Nov 27 19:01:29 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Nov 27 19:01:29 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Nov 27 19:01:29 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 27 19:01:29 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Nov 27 19:01:29 localhost systemd[1]: Reached target Initrd Root Device. Nov 27 19:01:29 localhost systemd[1]: Finished dracut initqueue hook. Nov 27 19:01:29 localhost systemd[1]: Reached target Preparation for Remote File Systems. Nov 27 19:01:29 localhost systemd[1]: Reached target Remote Encrypted Volumes. Nov 27 19:01:29 localhost systemd[1]: Reached target Remote File Systems. Nov 27 19:01:29 localhost systemd[1]: Starting dracut pre-mount hook... Nov 27 19:01:29 localhost systemd[1]: Finished dracut pre-mount hook. Nov 27 19:01:29 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/b277050f-8ace-464d-abb6-4c46d4c45253... Nov 27 19:01:29 localhost systemd-fsck[555]: /usr/sbin/fsck.xfs: XFS file system. Nov 27 19:01:29 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/b277050f-8ace-464d-abb6-4c46d4c45253. Nov 27 19:01:29 localhost systemd[1]: Mounting /sysroot... Nov 27 19:01:30 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Nov 27 19:01:30 localhost kernel: XFS (vda1): Mounting V5 Filesystem b277050f-8ace-464d-abb6-4c46d4c45253 Nov 27 19:01:30 localhost kernel: XFS (vda1): Ending clean mount Nov 27 19:01:30 localhost systemd[1]: Mounted /sysroot. Nov 27 19:01:30 localhost systemd[1]: Reached target Initrd Root File System. Nov 27 19:01:30 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Nov 27 19:01:30 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Nov 27 19:01:30 localhost systemd[1]: Reached target Initrd File Systems. Nov 27 19:01:30 localhost systemd[1]: Reached target Initrd Default Target. Nov 27 19:01:30 localhost systemd[1]: Starting dracut mount hook... Nov 27 19:01:30 localhost systemd[1]: Finished dracut mount hook. Nov 27 19:01:30 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Nov 27 19:01:30 localhost rpc.idmapd[446]: exiting on signal 15 Nov 27 19:01:30 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Nov 27 19:01:30 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Nov 27 19:01:30 localhost systemd[1]: Stopped target Network. Nov 27 19:01:30 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Nov 27 19:01:30 localhost systemd[1]: Stopped target Timer Units. Nov 27 19:01:30 localhost systemd[1]: dbus.socket: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Nov 27 19:01:30 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Nov 27 19:01:30 localhost systemd[1]: Stopped target Initrd Default Target. Nov 27 19:01:30 localhost systemd[1]: Stopped target Basic System. Nov 27 19:01:30 localhost systemd[1]: Stopped target Initrd Root Device. Nov 27 19:01:30 localhost systemd[1]: Stopped target Initrd /usr File System. Nov 27 19:01:30 localhost systemd[1]: Stopped target Path Units. Nov 27 19:01:30 localhost systemd[1]: Stopped target Remote File Systems. Nov 27 19:01:30 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Nov 27 19:01:30 localhost systemd[1]: Stopped target Slice Units. Nov 27 19:01:30 localhost systemd[1]: Stopped target Socket Units. Nov 27 19:01:30 localhost systemd[1]: Stopped target System Initialization. Nov 27 19:01:30 localhost systemd[1]: Stopped target Local File Systems. Nov 27 19:01:30 localhost systemd[1]: Stopped target Swaps. Nov 27 19:01:30 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut mount hook. Nov 27 19:01:30 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut pre-mount hook. Nov 27 19:01:30 localhost systemd[1]: Stopped target Local Encrypted Volumes. Nov 27 19:01:30 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Nov 27 19:01:30 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut initqueue hook. Nov 27 19:01:30 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Apply Kernel Variables. Nov 27 19:01:30 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Create Volatile Files and Directories. Nov 27 19:01:30 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Coldplug All udev Devices. Nov 27 19:01:30 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut pre-trigger hook. Nov 27 19:01:30 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Nov 27 19:01:30 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Setup Virtual Console. Nov 27 19:01:30 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Nov 27 19:01:30 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Nov 27 19:01:30 localhost systemd[1]: systemd-udevd.service: Consumed 1.103s CPU time. Nov 27 19:01:30 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Closed udev Control Socket. Nov 27 19:01:30 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Closed udev Kernel Socket. Nov 27 19:01:30 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut pre-udev hook. Nov 27 19:01:30 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped dracut cmdline hook. Nov 27 19:01:30 localhost systemd[1]: Starting Cleanup udev Database... Nov 27 19:01:30 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Nov 27 19:01:30 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Create List of Static Device Nodes. Nov 27 19:01:30 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Stopped Create System Users. Nov 27 19:01:30 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 27 19:01:30 localhost systemd[1]: Finished Cleanup udev Database. Nov 27 19:01:30 localhost systemd[1]: Reached target Switch Root. Nov 27 19:01:30 localhost systemd[1]: Starting Switch Root... Nov 27 19:01:30 localhost systemd[1]: Switching root. Nov 27 19:01:30 localhost systemd-journald[307]: Journal stopped Nov 27 19:01:31 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Nov 27 19:01:31 localhost kernel: audit: type=1404 audit(1764288090.896:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability open_perms=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability always_check_network=0 Nov 27 19:01:31 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:01:31 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:01:31 localhost kernel: audit: type=1403 audit(1764288091.046:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 27 19:01:31 localhost systemd[1]: Successfully loaded SELinux policy in 154.114ms. Nov 27 19:01:31 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 28.222ms. Nov 27 19:01:31 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 27 19:01:31 localhost systemd[1]: Detected virtualization kvm. Nov 27 19:01:31 localhost systemd[1]: Detected architecture x86-64. Nov 27 19:01:31 localhost systemd-rc-local-generator[634]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:01:31 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Stopped Switch Root. Nov 27 19:01:31 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 27 19:01:31 localhost systemd[1]: Created slice Slice /system/getty. Nov 27 19:01:31 localhost systemd[1]: Created slice Slice /system/serial-getty. Nov 27 19:01:31 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Nov 27 19:01:31 localhost systemd[1]: Created slice User and Session Slice. Nov 27 19:01:31 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Nov 27 19:01:31 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Nov 27 19:01:31 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Nov 27 19:01:31 localhost systemd[1]: Reached target Local Encrypted Volumes. Nov 27 19:01:31 localhost systemd[1]: Stopped target Switch Root. Nov 27 19:01:31 localhost systemd[1]: Stopped target Initrd File Systems. Nov 27 19:01:31 localhost systemd[1]: Stopped target Initrd Root File System. Nov 27 19:01:31 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Nov 27 19:01:31 localhost systemd[1]: Reached target Path Units. Nov 27 19:01:31 localhost systemd[1]: Reached target rpc_pipefs.target. Nov 27 19:01:31 localhost systemd[1]: Reached target Slice Units. Nov 27 19:01:31 localhost systemd[1]: Reached target Swaps. Nov 27 19:01:31 localhost systemd[1]: Reached target Local Verity Protected Volumes. Nov 27 19:01:31 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Nov 27 19:01:31 localhost systemd[1]: Reached target RPC Port Mapper. Nov 27 19:01:31 localhost systemd[1]: Listening on Process Core Dump Socket. Nov 27 19:01:31 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Nov 27 19:01:31 localhost systemd[1]: Listening on udev Control Socket. Nov 27 19:01:31 localhost systemd[1]: Listening on udev Kernel Socket. Nov 27 19:01:31 localhost systemd[1]: Mounting Huge Pages File System... Nov 27 19:01:31 localhost systemd[1]: Mounting POSIX Message Queue File System... Nov 27 19:01:31 localhost systemd[1]: Mounting Kernel Debug File System... Nov 27 19:01:31 localhost systemd[1]: Mounting Kernel Trace File System... Nov 27 19:01:31 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Nov 27 19:01:31 localhost systemd[1]: Starting Create List of Static Device Nodes... Nov 27 19:01:31 localhost systemd[1]: Starting Load Kernel Module configfs... Nov 27 19:01:31 localhost systemd[1]: Starting Load Kernel Module drm... Nov 27 19:01:31 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Nov 27 19:01:31 localhost systemd[1]: Starting Load Kernel Module fuse... Nov 27 19:01:31 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Nov 27 19:01:31 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Stopped File System Check on Root Device. Nov 27 19:01:31 localhost systemd[1]: Stopped Journal Service. Nov 27 19:01:31 localhost systemd[1]: Starting Journal Service... Nov 27 19:01:31 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Nov 27 19:01:31 localhost systemd[1]: Starting Generate network units from Kernel command line... Nov 27 19:01:31 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 27 19:01:31 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Nov 27 19:01:31 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Nov 27 19:01:31 localhost systemd[1]: Starting Apply Kernel Variables... Nov 27 19:01:31 localhost kernel: fuse: init (API version 7.37) Nov 27 19:01:31 localhost systemd[1]: Starting Coldplug All udev Devices... Nov 27 19:01:31 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Nov 27 19:01:31 localhost systemd[1]: Mounted Huge Pages File System. Nov 27 19:01:31 localhost systemd[1]: Mounted POSIX Message Queue File System. Nov 27 19:01:31 localhost systemd[1]: Mounted Kernel Debug File System. Nov 27 19:01:31 localhost systemd[1]: Mounted Kernel Trace File System. Nov 27 19:01:31 localhost systemd-journald[675]: Journal started Nov 27 19:01:31 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/1f988c78c563e12389ab342aced42dbb) is 8.0M, max 153.6M, 145.6M free. Nov 27 19:01:31 localhost systemd[1]: Queued start job for default target Multi-User System. Nov 27 19:01:31 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Started Journal Service. Nov 27 19:01:31 localhost systemd[1]: Finished Create List of Static Device Nodes. Nov 27 19:01:31 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Finished Load Kernel Module configfs. Nov 27 19:01:31 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Nov 27 19:01:31 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Finished Load Kernel Module fuse. Nov 27 19:01:31 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Nov 27 19:01:31 localhost systemd[1]: Finished Generate network units from Kernel command line. Nov 27 19:01:31 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Nov 27 19:01:31 localhost kernel: ACPI: bus type drm_connector registered Nov 27 19:01:31 localhost systemd[1]: Mounting FUSE Control File System... Nov 27 19:01:31 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Nov 27 19:01:31 localhost systemd[1]: Starting Rebuild Hardware Database... Nov 27 19:01:31 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Nov 27 19:01:31 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 27 19:01:31 localhost systemd[1]: Starting Load/Save OS Random Seed... Nov 27 19:01:31 localhost systemd[1]: Starting Create System Users... Nov 27 19:01:31 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 27 19:01:31 localhost systemd[1]: Finished Load Kernel Module drm. Nov 27 19:01:31 localhost systemd-journald[675]: Runtime Journal (/run/log/journal/1f988c78c563e12389ab342aced42dbb) is 8.0M, max 153.6M, 145.6M free. Nov 27 19:01:31 localhost systemd-journald[675]: Received client request to flush runtime journal. Nov 27 19:01:31 localhost systemd[1]: Finished Apply Kernel Variables. Nov 27 19:01:31 localhost systemd[1]: Mounted FUSE Control File System. Nov 27 19:01:31 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Nov 27 19:01:31 localhost systemd[1]: Finished Coldplug All udev Devices. Nov 27 19:01:31 localhost systemd[1]: Finished Load/Save OS Random Seed. Nov 27 19:01:31 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Nov 27 19:01:31 localhost systemd[1]: Finished Create System Users. Nov 27 19:01:31 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Nov 27 19:01:31 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Nov 27 19:01:31 localhost systemd[1]: Reached target Preparation for Local File Systems. Nov 27 19:01:31 localhost systemd[1]: Reached target Local File Systems. Nov 27 19:01:31 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Nov 27 19:01:31 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Nov 27 19:01:31 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Nov 27 19:01:31 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Nov 27 19:01:31 localhost systemd[1]: Starting Automatic Boot Loader Update... Nov 27 19:01:31 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Nov 27 19:01:31 localhost systemd[1]: Starting Create Volatile Files and Directories... Nov 27 19:01:31 localhost bootctl[694]: Couldn't find EFI system partition, skipping. Nov 27 19:01:31 localhost systemd[1]: Finished Automatic Boot Loader Update. Nov 27 19:01:31 localhost systemd[1]: Finished Create Volatile Files and Directories. Nov 27 19:01:32 localhost systemd[1]: Starting Security Auditing Service... Nov 27 19:01:32 localhost systemd[1]: Starting RPC Bind... Nov 27 19:01:32 localhost systemd[1]: Starting Rebuild Journal Catalog... Nov 27 19:01:32 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Nov 27 19:01:32 localhost auditd[700]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Nov 27 19:01:32 localhost auditd[700]: Init complete, auditd 3.1.5 listening for events (startup state enable) Nov 27 19:01:32 localhost systemd[1]: Started RPC Bind. Nov 27 19:01:32 localhost systemd[1]: Finished Rebuild Journal Catalog. Nov 27 19:01:32 localhost augenrules[705]: /sbin/augenrules: No change Nov 27 19:01:32 localhost augenrules[720]: No rules Nov 27 19:01:32 localhost augenrules[720]: enabled 1 Nov 27 19:01:32 localhost augenrules[720]: failure 1 Nov 27 19:01:32 localhost augenrules[720]: pid 700 Nov 27 19:01:32 localhost augenrules[720]: rate_limit 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_limit 8192 Nov 27 19:01:32 localhost augenrules[720]: lost 0 Nov 27 19:01:32 localhost augenrules[720]: backlog 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time 60000 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time_actual 0 Nov 27 19:01:32 localhost augenrules[720]: enabled 1 Nov 27 19:01:32 localhost augenrules[720]: failure 1 Nov 27 19:01:32 localhost augenrules[720]: pid 700 Nov 27 19:01:32 localhost augenrules[720]: rate_limit 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_limit 8192 Nov 27 19:01:32 localhost augenrules[720]: lost 0 Nov 27 19:01:32 localhost augenrules[720]: backlog 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time 60000 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time_actual 0 Nov 27 19:01:32 localhost augenrules[720]: enabled 1 Nov 27 19:01:32 localhost augenrules[720]: failure 1 Nov 27 19:01:32 localhost augenrules[720]: pid 700 Nov 27 19:01:32 localhost augenrules[720]: rate_limit 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_limit 8192 Nov 27 19:01:32 localhost augenrules[720]: lost 0 Nov 27 19:01:32 localhost augenrules[720]: backlog 0 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time 60000 Nov 27 19:01:32 localhost augenrules[720]: backlog_wait_time_actual 0 Nov 27 19:01:32 localhost systemd[1]: Started Security Auditing Service. Nov 27 19:01:32 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Nov 27 19:01:32 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Nov 27 19:01:32 localhost systemd[1]: Finished Rebuild Hardware Database. Nov 27 19:01:32 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Nov 27 19:01:32 localhost systemd[1]: Starting Update is Completed... Nov 27 19:01:32 localhost systemd[1]: Finished Update is Completed. Nov 27 19:01:32 localhost systemd-udevd[728]: Using default interface naming scheme 'rhel-9.0'. Nov 27 19:01:32 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Nov 27 19:01:32 localhost systemd[1]: Reached target System Initialization. Nov 27 19:01:32 localhost systemd[1]: Started dnf makecache --timer. Nov 27 19:01:32 localhost systemd[1]: Started Daily rotation of log files. Nov 27 19:01:32 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Nov 27 19:01:32 localhost systemd[1]: Reached target Timer Units. Nov 27 19:01:32 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 27 19:01:32 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Nov 27 19:01:32 localhost systemd[1]: Reached target Socket Units. Nov 27 19:01:32 localhost systemd[1]: Starting D-Bus System Message Bus... Nov 27 19:01:32 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 27 19:01:32 localhost systemd[1]: Starting Load Kernel Module configfs... Nov 27 19:01:32 localhost systemd-udevd[733]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:01:32 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Nov 27 19:01:32 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 27 19:01:32 localhost systemd[1]: Finished Load Kernel Module configfs. Nov 27 19:01:32 localhost systemd[1]: Started D-Bus System Message Bus. Nov 27 19:01:32 localhost systemd[1]: Reached target Basic System. Nov 27 19:01:32 localhost dbus-broker-lau[766]: Ready Nov 27 19:01:32 localhost systemd[1]: Starting NTP client/server... Nov 27 19:01:32 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Nov 27 19:01:32 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Nov 27 19:01:32 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Nov 27 19:01:32 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Nov 27 19:01:32 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Nov 27 19:01:32 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Nov 27 19:01:32 localhost chronyd[783]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Nov 27 19:01:32 localhost chronyd[783]: Loaded 0 symmetric keys Nov 27 19:01:32 localhost chronyd[783]: Using right/UTC timezone to obtain leap second data Nov 27 19:01:32 localhost chronyd[783]: Loaded seccomp filter (level 2) Nov 27 19:01:32 localhost systemd[1]: Starting IPv4 firewall with iptables... Nov 27 19:01:32 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Nov 27 19:01:32 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Nov 27 19:01:32 localhost systemd[1]: Started irqbalance daemon. Nov 27 19:01:32 localhost kernel: Console: switching to colour dummy device 80x25 Nov 27 19:01:32 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Nov 27 19:01:32 localhost kernel: [drm] features: -context_init Nov 27 19:01:32 localhost kernel: [drm] number of scanouts: 1 Nov 27 19:01:32 localhost kernel: [drm] number of cap sets: 0 Nov 27 19:01:32 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Nov 27 19:01:32 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:01:32 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:01:32 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:01:32 localhost systemd[1]: Reached target sshd-keygen.target. Nov 27 19:01:32 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Nov 27 19:01:32 localhost systemd[1]: Reached target User and Group Name Lookups. Nov 27 19:01:32 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Nov 27 19:01:32 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Nov 27 19:01:32 localhost kernel: Console: switching to colour frame buffer device 128x48 Nov 27 19:01:32 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Nov 27 19:01:32 localhost systemd[1]: Starting User Login Management... Nov 27 19:01:32 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Nov 27 19:01:32 localhost systemd[1]: Started NTP client/server. Nov 27 19:01:32 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Nov 27 19:01:32 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Nov 27 19:01:32 localhost kernel: kvm_amd: TSC scaling supported Nov 27 19:01:32 localhost kernel: kvm_amd: Nested Virtualization enabled Nov 27 19:01:32 localhost kernel: kvm_amd: Nested Paging enabled Nov 27 19:01:32 localhost kernel: kvm_amd: LBR virtualization supported Nov 27 19:01:32 localhost systemd-logind[802]: New seat seat0. Nov 27 19:01:32 localhost systemd-logind[802]: Watching system buttons on /dev/input/event0 (Power Button) Nov 27 19:01:32 localhost systemd-logind[802]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Nov 27 19:01:32 localhost systemd[1]: Started User Login Management. Nov 27 19:01:32 localhost iptables.init[785]: iptables: Applying firewall rules: [ OK ] Nov 27 19:01:32 localhost systemd[1]: Finished IPv4 firewall with iptables. Nov 27 19:01:33 localhost cloud-init[840]: Cloud-init v. 24.4-7.el9 running 'init-local' at Fri, 28 Nov 2025 00:01:32 +0000. Up 6.74 seconds. Nov 27 19:01:33 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Nov 27 19:01:33 localhost kernel: ISO 9660 Extensions: RRIP_1991A Nov 27 19:01:33 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp90omvggr.mount: Deactivated successfully. Nov 27 19:01:33 localhost systemd[1]: Starting Hostname Service... Nov 27 19:01:33 localhost systemd[1]: Started Hostname Service. Nov 27 19:01:33 np0005538338.novalocal systemd-hostnamed[854]: Hostname set to (static) Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Reached target Preparation for Network. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Starting Network Manager... Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6117] NetworkManager (version 1.54.1-1.el9) is starting... (boot:e7ed7446-0fbb-4e0c-be73-cd2951536045) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6123] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6214] manager[0x55d0be49f080]: monitoring kernel firmware directory '/lib/firmware'. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6269] hostname: hostname: using hostnamed Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6269] hostname: static hostname changed from (none) to "np0005538338.novalocal" Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6274] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6437] manager[0x55d0be49f080]: rfkill: Wi-Fi hardware radio set enabled Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6437] manager[0x55d0be49f080]: rfkill: WWAN hardware radio set enabled Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6489] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6497] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6498] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6499] manager: Networking is enabled by state file Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6502] settings: Loaded settings plugin: keyfile (internal) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6519] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6542] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6558] dhcp: init: Using DHCP client 'internal' Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6562] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6579] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6587] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6597] device (lo): Activation: starting connection 'lo' (065c5fd2-7160-4e06-abcc-b182c49cd79b) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6608] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6611] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6648] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6652] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6654] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6657] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6659] device (eth0): carrier: link connected Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6662] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6671] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6678] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6682] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6683] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6686] manager: NetworkManager state is now CONNECTING Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6688] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6695] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6699] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Started Network Manager. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Reached target Network. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6780] dhcp4 (eth0): state changed new lease, address=38.102.83.144 Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6791] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6813] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Starting Network Manager Wait Online... Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6877] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6880] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6881] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6887] device (lo): Activation: successful, device activated. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6895] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6899] manager: NetworkManager state is now CONNECTED_SITE Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6902] device (eth0): Activation: successful, device activated. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6910] manager: NetworkManager state is now CONNECTED_GLOBAL Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Nov 27 19:01:33 np0005538338.novalocal NetworkManager[858]: [1764288093.6913] manager: startup complete Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Reached target NFS client services. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Reached target Remote File Systems. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Finished Network Manager Wait Online. Nov 27 19:01:33 np0005538338.novalocal systemd[1]: Starting Cloud-init: Network Stage... Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: Cloud-init v. 24.4-7.el9 running 'init' at Fri, 28 Nov 2025 00:01:34 +0000. Up 7.78 seconds. Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | eth0 | True | 38.102.83.144 | 255.255.255.0 | global | fa:16:3e:ce:65:2f | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | eth0 | True | fe80::f816:3eff:fece:652f/64 | . | link | fa:16:3e:ce:65:2f | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | lo | True | ::1/128 | . | host | . | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Interface | Flags | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: | 3 | multicast | :: | eth0 | U | Nov 27 19:01:34 np0005538338.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 27 19:01:35 np0005538338.novalocal useradd[988]: new group: name=cloud-user, GID=1001 Nov 27 19:01:35 np0005538338.novalocal useradd[988]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Nov 27 19:01:35 np0005538338.novalocal useradd[988]: add 'cloud-user' to group 'adm' Nov 27 19:01:35 np0005538338.novalocal useradd[988]: add 'cloud-user' to group 'systemd-journal' Nov 27 19:01:35 np0005538338.novalocal useradd[988]: add 'cloud-user' to shadow group 'adm' Nov 27 19:01:35 np0005538338.novalocal useradd[988]: add 'cloud-user' to shadow group 'systemd-journal' Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Generating public/private rsa key pair. Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key fingerprint is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: SHA256:h/A7vjfyKqms3kbRpZ2Nvyd8rg7OyzRyuM4my0za4Ek root@np0005538338.novalocal Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key's randomart image is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +---[RSA 3072]----+ Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | ..+ + | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | . oo+.. | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | . S.. | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | . . o. | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | E.. o.B. . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | o @o.+X.+* o | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | .*oO*+.OO+B. | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +----[SHA256]-----+ Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Generating public/private ecdsa key pair. Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key fingerprint is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: SHA256:ej/SjlC9EDphP3h/eHhZCdniy2carCIwZnWF8yTqnp8 root@np0005538338.novalocal Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key's randomart image is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +---[ECDSA 256]---+ Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | + o o | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | o..* + . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | .o=.o.. o . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | o+.S . . o | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | = .= + * + | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | o +o...= X o | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | +oo+o= = | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | oE++.. | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +----[SHA256]-----+ Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Generating public/private ed25519 key pair. Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key fingerprint is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: SHA256:/lbXOt5B6VtvyWz9jjJhchwSX0J8RavshAOlTj26NG4 root@np0005538338.novalocal Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: The key's randomart image is: Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +--[ED25519 256]--+ Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | +. oo| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | = o o .| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | + = + . | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | o + * . .| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | S= = = + | Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | .o + X + .| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | .E = +o++| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | ... o oBB| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: | .. ++=*| Nov 27 19:01:35 np0005538338.novalocal cloud-init[922]: +----[SHA256]-----+ Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Finished Cloud-init: Network Stage. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Reached target Cloud-config availability. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Reached target Network is Online. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting Cloud-init: Config Stage... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting Crash recovery kernel arming... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting Notify NFS peers of a restart... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting System Logging Service... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting OpenSSH server daemon... Nov 27 19:01:35 np0005538338.novalocal sm-notify[1004]: Version 2.5.4 starting Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting Permit User Sessions... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started Notify NFS peers of a restart. Nov 27 19:01:35 np0005538338.novalocal sshd[1006]: Server listening on 0.0.0.0 port 22. Nov 27 19:01:35 np0005538338.novalocal sshd[1006]: Server listening on :: port 22. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started OpenSSH server daemon. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Finished Permit User Sessions. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started Command Scheduler. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started Getty on tty1. Nov 27 19:01:35 np0005538338.novalocal crond[1010]: (CRON) STARTUP (1.5.7) Nov 27 19:01:35 np0005538338.novalocal crond[1010]: (CRON) INFO (Syslog will be used instead of sendmail.) Nov 27 19:01:35 np0005538338.novalocal crond[1010]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 11% if used.) Nov 27 19:01:35 np0005538338.novalocal crond[1010]: (CRON) INFO (running with inotify support) Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started Serial Getty on ttyS0. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Reached target Login Prompts. Nov 27 19:01:35 np0005538338.novalocal rsyslogd[1005]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1005" x-info="https://www.rsyslog.com"] start Nov 27 19:01:35 np0005538338.novalocal rsyslogd[1005]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Started System Logging Service. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Reached target Multi-User System. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Nov 27 19:01:35 np0005538338.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 27 19:01:35 np0005538338.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Nov 27 19:01:35 np0005538338.novalocal rsyslogd[1005]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Nov 27 19:01:35 np0005538338.novalocal kdumpctl[1012]: kdump: No kdump initial ramdisk found. Nov 27 19:01:35 np0005538338.novalocal kdumpctl[1012]: kdump: Rebuilding /boot/initramfs-5.14.0-642.el9.x86_64kdump.img Nov 27 19:01:36 np0005538338.novalocal cloud-init[1134]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Fri, 28 Nov 2025 00:01:36 +0000. Up 9.85 seconds. Nov 27 19:01:36 np0005538338.novalocal systemd[1]: Finished Cloud-init: Config Stage. Nov 27 19:01:36 np0005538338.novalocal systemd[1]: Starting Cloud-init: Final Stage... Nov 27 19:01:36 np0005538338.novalocal dracut[1269]: dracut-057-102.git20250818.el9 Nov 27 19:01:36 np0005538338.novalocal cloud-init[1277]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Fri, 28 Nov 2025 00:01:36 +0000. Up 10.25 seconds. Nov 27 19:01:36 np0005538338.novalocal cloud-init[1287]: ############################################################# Nov 27 19:01:36 np0005538338.novalocal cloud-init[1288]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Nov 27 19:01:36 np0005538338.novalocal cloud-init[1290]: 256 SHA256:ej/SjlC9EDphP3h/eHhZCdniy2carCIwZnWF8yTqnp8 root@np0005538338.novalocal (ECDSA) Nov 27 19:01:36 np0005538338.novalocal cloud-init[1292]: 256 SHA256:/lbXOt5B6VtvyWz9jjJhchwSX0J8RavshAOlTj26NG4 root@np0005538338.novalocal (ED25519) Nov 27 19:01:36 np0005538338.novalocal cloud-init[1294]: 3072 SHA256:h/A7vjfyKqms3kbRpZ2Nvyd8rg7OyzRyuM4my0za4Ek root@np0005538338.novalocal (RSA) Nov 27 19:01:36 np0005538338.novalocal cloud-init[1295]: -----END SSH HOST KEY FINGERPRINTS----- Nov 27 19:01:36 np0005538338.novalocal cloud-init[1296]: ############################################################# Nov 27 19:01:36 np0005538338.novalocal cloud-init[1277]: Cloud-init v. 24.4-7.el9 finished at Fri, 28 Nov 2025 00:01:36 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.48 seconds Nov 27 19:01:36 np0005538338.novalocal dracut[1271]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/b277050f-8ace-464d-abb6-4c46d4c45253 /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-642.el9.x86_64kdump.img 5.14.0-642.el9.x86_64 Nov 27 19:01:36 np0005538338.novalocal sshd-session[1309]: Connection reset by 38.102.83.114 port 48896 [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1324]: Unable to negotiate with 38.102.83.114 port 48898: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1331]: Connection reset by 38.102.83.114 port 48908 [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1343]: Unable to negotiate with 38.102.83.114 port 48918: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Nov 27 19:01:36 np0005538338.novalocal systemd[1]: Finished Cloud-init: Final Stage. Nov 27 19:01:36 np0005538338.novalocal sshd-session[1355]: Unable to negotiate with 38.102.83.114 port 48920: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Nov 27 19:01:36 np0005538338.novalocal systemd[1]: Reached target Cloud-init target. Nov 27 19:01:36 np0005538338.novalocal sshd-session[1362]: Connection reset by 38.102.83.114 port 48922 [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1366]: Unable to negotiate with 38.102.83.114 port 48942: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1371]: Unable to negotiate with 38.102.83.114 port 48944: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Nov 27 19:01:36 np0005538338.novalocal sshd-session[1364]: Connection closed by 38.102.83.114 port 48936 [preauth] Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: Module 'resume' will not be installed, because it's in the list to be omitted! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Nov 27 19:01:37 np0005538338.novalocal dracut[1271]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: memstrack is not available Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: memstrack is not available Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Nov 27 19:01:38 np0005538338.novalocal chronyd[783]: Selected source 162.159.200.1 (2.centos.pool.ntp.org) Nov 27 19:01:38 np0005538338.novalocal chronyd[783]: System clock TAI offset set to 37 seconds Nov 27 19:01:38 np0005538338.novalocal dracut[1271]: *** Including module: systemd *** Nov 27 19:01:39 np0005538338.novalocal dracut[1271]: *** Including module: fips *** Nov 27 19:01:39 np0005538338.novalocal dracut[1271]: *** Including module: systemd-initrd *** Nov 27 19:01:39 np0005538338.novalocal dracut[1271]: *** Including module: i18n *** Nov 27 19:01:39 np0005538338.novalocal dracut[1271]: *** Including module: drm *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: prefixdevname *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: kernel-modules *** Nov 27 19:01:40 np0005538338.novalocal kernel: block vda: the capability attribute has been deprecated. Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: kernel-modules-extra *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: qemu *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: fstab-sys *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: rootfs-block *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: terminfo *** Nov 27 19:01:40 np0005538338.novalocal dracut[1271]: *** Including module: udev-rules *** Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: Skipping udev rule: 91-permissions.rules Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: Skipping udev rule: 80-drivers-modprobe.rules Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: *** Including module: virtiofs *** Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: *** Including module: dracut-systemd *** Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: *** Including module: usrmount *** Nov 27 19:01:41 np0005538338.novalocal dracut[1271]: *** Including module: base *** Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: *** Including module: fs-lib *** Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: *** Including module: kdumpbase *** Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: *** Including module: microcode_ctl-fw_dir_override *** Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl module: mangling fw_dir Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-2d-07" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-4e-03" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-4f-01" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-55-04" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-5e-03" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-8c-01" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Nov 27 19:01:42 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: microcode_ctl: configuration "intel-06-8f-08" is ignored Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: *** Including module: openssl *** Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: *** Including module: shutdown *** Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: *** Including module: squash *** Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 25 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 25 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 31 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 31 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 28 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 28 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 32 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 32 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 30 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 30 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 29 affinity: Operation not permitted Nov 27 19:01:43 np0005538338.novalocal irqbalance[794]: IRQ 29 affinity is now unmanaged Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: *** Including modules done *** Nov 27 19:01:43 np0005538338.novalocal dracut[1271]: *** Installing kernel module dependencies *** Nov 27 19:01:43 np0005538338.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 27 19:01:44 np0005538338.novalocal dracut[1271]: *** Installing kernel module dependencies done *** Nov 27 19:01:44 np0005538338.novalocal dracut[1271]: *** Resolving executable dependencies *** Nov 27 19:01:45 np0005538338.novalocal dracut[1271]: *** Resolving executable dependencies done *** Nov 27 19:01:45 np0005538338.novalocal dracut[1271]: *** Generating early-microcode cpio image *** Nov 27 19:01:45 np0005538338.novalocal dracut[1271]: *** Store current command line parameters *** Nov 27 19:01:45 np0005538338.novalocal dracut[1271]: Stored kernel commandline: Nov 27 19:01:45 np0005538338.novalocal dracut[1271]: No dracut internal kernel commandline stored in the initramfs Nov 27 19:01:46 np0005538338.novalocal dracut[1271]: *** Install squash loader *** Nov 27 19:01:46 np0005538338.novalocal sshd-session[4078]: Accepted publickey for zuul-worker from 38.102.83.114 port 46704 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Nov 27 19:01:46 np0005538338.novalocal systemd[1]: Created slice User Slice of UID 1000. Nov 27 19:01:46 np0005538338.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Nov 27 19:01:46 np0005538338.novalocal systemd-logind[802]: New session 1 of user zuul-worker. Nov 27 19:01:47 np0005538338.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Nov 27 19:01:47 np0005538338.novalocal systemd[1]: Starting User Manager for UID 1000... Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Nov 27 19:01:47 np0005538338.novalocal dracut[1271]: *** Squashing the files inside the initramfs *** Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Queued start job for default target Main User Target. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Created slice User Application Slice. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Started Mark boot as successful after the user session has run 2 minutes. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Started Daily Cleanup of User's Temporary Directories. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Reached target Paths. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Reached target Timers. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Starting D-Bus User Message Bus Socket... Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Starting Create User's Volatile Files and Directories... Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Finished Create User's Volatile Files and Directories. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Listening on D-Bus User Message Bus Socket. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Reached target Sockets. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Reached target Basic System. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Reached target Main User Target. Nov 27 19:01:47 np0005538338.novalocal systemd[4082]: Startup finished in 172ms. Nov 27 19:01:47 np0005538338.novalocal systemd[1]: Started User Manager for UID 1000. Nov 27 19:01:47 np0005538338.novalocal systemd[1]: Started Session 1 of User zuul-worker. Nov 27 19:01:47 np0005538338.novalocal sshd-session[4078]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Nov 27 19:01:47 np0005538338.novalocal python3[4232]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: *** Squashing the files inside the initramfs done *** Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: *** Creating image file '/boot/initramfs-5.14.0-642.el9.x86_64kdump.img' *** Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: *** Hardlinking files *** Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Mode: real Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Files: 50 Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Linked: 0 files Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Compared: 0 xattrs Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Compared: 0 files Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Saved: 0 B Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: Duration: 0.000829 seconds Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: *** Hardlinking files done *** Nov 27 19:01:48 np0005538338.novalocal dracut[1271]: *** Creating initramfs image file '/boot/initramfs-5.14.0-642.el9.x86_64kdump.img' done *** Nov 27 19:01:49 np0005538338.novalocal kdumpctl[1012]: kdump: kexec: loaded kdump kernel Nov 27 19:01:49 np0005538338.novalocal kdumpctl[1012]: kdump: Starting kdump: [OK] Nov 27 19:01:49 np0005538338.novalocal systemd[1]: Finished Crash recovery kernel arming. Nov 27 19:01:49 np0005538338.novalocal systemd[1]: Startup finished in 1.708s (kernel) + 2.951s (initrd) + 18.228s (userspace) = 22.888s. Nov 27 19:01:50 np0005538338.novalocal python3[4412]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 27 19:01:55 np0005538338.novalocal python3[4470]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 27 19:01:55 np0005538338.novalocal python3[4510]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Nov 27 19:01:57 np0005538338.novalocal python3[4536]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC6XfjeUOnK1KN7KCJ+bl6DoWvo5NW68NnULiopwSn86HCYqSNAFIzGxCM4AxGtlYoa/Ct0zllgF4M1ym+lcrIV4WNPB/xKvsLyYo62D1MntOu8GpIss0HDVD7fL3yeTgL/r8z7UREII8qZ7DK/kpYeVr62FEhi0OsR1jGDjyuwJpQqTq7PZvrEUHHXCIEbzq8BS/ceR6MwrU0IvgVahSBqyAviNuWrSgy0bOjvOF7Vzz9/5UfvXTrJQZfQNz5kjxAriT939+7+fW39MlvTKA5sEcHI3eEv/9Zpu304PhyWtjn5CpWI+stXSMtYrBV7m7X3rvF0/wIVeN0B3BRRAMn4EWb16rghk2izyaNCY7PTDWbuCZqXwYEY8XFfjBGGVNbgVgFApNQpSbHwRvi2gmBJ864d3x6AHLs6ls9GzO/KGN3qTguvlxqCAza9MAQ+Sp37VogzWLt2i/I/ruR7Robs/8SmOZX6S7Er3+LfMo3ki9UF1nZFVKht8PElpz7xW8U= zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 27 19:01:57 np0005538338.novalocal python3[4560]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:01:58 np0005538338.novalocal python3[4659]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:01:58 np0005538338.novalocal python3[4730]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288117.8390281-163-215009946455316/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=08bcf32633ee4d4787fd6f596f1f4673_id_rsa follow=False checksum=48d140876d04b78ae56ff3de743791794fa49ee5 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:01:59 np0005538338.novalocal python3[4853]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:01:59 np0005538338.novalocal python3[4924]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288118.7535486-174-250059487104598/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=08bcf32633ee4d4787fd6f596f1f4673_id_rsa.pub follow=False checksum=f6fa7c68f6ca8e10ddecd159453a9b428be375e2 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:00 np0005538338.novalocal python3[4972]: ansible-ping Invoked with data=pong Nov 27 19:02:01 np0005538338.novalocal python3[4996]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 27 19:02:03 np0005538338.novalocal python3[5054]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Nov 27 19:02:03 np0005538338.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 27 19:02:03 np0005538338.novalocal python3[5088]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:04 np0005538338.novalocal python3[5112]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:04 np0005538338.novalocal python3[5136]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:04 np0005538338.novalocal python3[5160]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:04 np0005538338.novalocal python3[5184]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:05 np0005538338.novalocal python3[5208]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:06 np0005538338.novalocal sshd-session[5209]: Invalid user support from 78.128.112.74 port 57004 Nov 27 19:02:06 np0005538338.novalocal sshd-session[5209]: Connection closed by invalid user support 78.128.112.74 port 57004 [preauth] Nov 27 19:02:08 np0005538338.novalocal python3[5234]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Nov 27 19:02:09 np0005538338.novalocal sshd-session[5237]: Accepted publickey for zuul-worker from 38.102.83.114 port 46782 ssh2: RSA SHA256:biKG7vq8UYlaOi62php9SJztOIjEE/t5GWGpDitqD78 Nov 27 19:02:09 np0005538338.novalocal systemd-logind[802]: New session 3 of user zuul-worker. Nov 27 19:02:09 np0005538338.novalocal systemd[1]: Started Session 3 of User zuul-worker. Nov 27 19:02:09 np0005538338.novalocal sshd-session[5237]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Nov 27 19:02:11 np0005538338.novalocal sshd-session[5240]: Received disconnect from 38.102.83.114 port 46782:11: disconnected by user Nov 27 19:02:11 np0005538338.novalocal sshd-session[5240]: Disconnected from user zuul-worker 38.102.83.114 port 46782 Nov 27 19:02:11 np0005538338.novalocal sshd-session[5237]: pam_unix(sshd:session): session closed for user zuul-worker Nov 27 19:02:11 np0005538338.novalocal systemd[1]: session-3.scope: Deactivated successfully. Nov 27 19:02:11 np0005538338.novalocal systemd[1]: session-3.scope: Consumed 1.433s CPU time. Nov 27 19:02:11 np0005538338.novalocal systemd-logind[802]: Session 3 logged out. Waiting for processes to exit. Nov 27 19:02:11 np0005538338.novalocal systemd-logind[802]: Removed session 3. Nov 27 19:02:11 np0005538338.novalocal python3[5288]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:12 np0005538338.novalocal python3[5312]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:12 np0005538338.novalocal python3[5336]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:12 np0005538338.novalocal python3[5360]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:12 np0005538338.novalocal python3[5384]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:13 np0005538338.novalocal python3[5408]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:13 np0005538338.novalocal python3[5433]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-7b70-a7f2-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:13 np0005538338.novalocal sudo[5434]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Nov 27 19:02:13 np0005538338.novalocal sudo[5434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:13 np0005538338.novalocal sudo[5434]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:14 np0005538338.novalocal python3[5462]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:14 np0005538338.novalocal sudo[5538]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dumljllvobeulqvqzomsaiuevjwhjhui ; /usr/bin/python3' Nov 27 19:02:14 np0005538338.novalocal sudo[5538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:14 np0005538338.novalocal python3[5540]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:02:14 np0005538338.novalocal sudo[5538]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:14 np0005538338.novalocal sudo[5611]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ijedhrzzeiqfvzaomdspptmyjaeyesir ; /usr/bin/python3' Nov 27 19:02:14 np0005538338.novalocal sudo[5611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:15 np0005538338.novalocal python3[5613]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288134.341794-91-191747022947786/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:15 np0005538338.novalocal sudo[5611]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:15 np0005538338.novalocal sudo[5713]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vengrywyvdqkkmzmfycxiawvttttzjjl ; /usr/bin/python3' Nov 27 19:02:15 np0005538338.novalocal sudo[5713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:15 np0005538338.novalocal python3[5715]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:02:15 np0005538338.novalocal sudo[5713]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:15 np0005538338.novalocal sudo[5788]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jpjdnfdbolxtzdhkhlgtjqqlmgnsxgsp ; /usr/bin/python3' Nov 27 19:02:15 np0005538338.novalocal sudo[5788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:16 np0005538338.novalocal python3[5790]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288135.4583519-103-228999798302631/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:16 np0005538338.novalocal sudo[5788]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:16 np0005538338.novalocal sudo[5890]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ommtmqeuseupxhopxhsktlxhaervaapj ; /usr/bin/python3' Nov 27 19:02:16 np0005538338.novalocal sudo[5890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:16 np0005538338.novalocal python3[5892]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:02:16 np0005538338.novalocal sudo[5890]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:16 np0005538338.novalocal sudo[5965]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rcdbmadpkqxjhvqfklqhornalznmtxku ; /usr/bin/python3' Nov 27 19:02:16 np0005538338.novalocal sudo[5965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:17 np0005538338.novalocal python3[5967]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288136.3094664-103-257928326923748/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:17 np0005538338.novalocal sudo[5965]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:17 np0005538338.novalocal sudo[6015]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cuudzvurauctvwhcxhatgszuedtsdozs ; /usr/bin/python3' Nov 27 19:02:17 np0005538338.novalocal sudo[6015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:17 np0005538338.novalocal python3[6017]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:17 np0005538338.novalocal python3[6017]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Nov 27 19:02:17 np0005538338.novalocal sudo[6015]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:17 np0005538338.novalocal sudo[6041]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sfnqsrnuhwiafqykhrduspnyjiuhvvnb ; /usr/bin/python3' Nov 27 19:02:17 np0005538338.novalocal sudo[6041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:18 np0005538338.novalocal python3[6043]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:18 np0005538338.novalocal sudo[6041]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:18 np0005538338.novalocal sudo[6069]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ouxdmsxfpkvoqwrrjqwepqubfgglcxuu ; /usr/bin/python3' Nov 27 19:02:18 np0005538338.novalocal sudo[6069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:18 np0005538338.novalocal python3[6071]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:23 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 27 affinity: Operation not permitted Nov 27 19:02:23 np0005538338.novalocal irqbalance[794]: IRQ 27 affinity is now unmanaged Nov 27 19:02:28 np0005538338.novalocal sudo[6069]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:30 np0005538338.novalocal python3[6112]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:30 np0005538338.novalocal python3[6137]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-0000000000a3-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Nov 27 19:02:31 np0005538338.novalocal sudo[6165]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-osjjmxagrepbzklnjhouuwdqfrvvfixq ; /usr/bin/python3' Nov 27 19:02:31 np0005538338.novalocal sudo[6165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:31 np0005538338.novalocal python3[6167]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:02:32 np0005538338.novalocal sudo[6165]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:33 np0005538338.novalocal python3[6199]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-0000000000ad-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Nov 27 19:02:34 np0005538338.novalocal python3[6227]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-000000000033-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Nov 27 19:02:35 np0005538338.novalocal python3[6255]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-43a1-cfe9-000000000036-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:38 np0005538338.novalocal python3[6287]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-43a1-cfe9-000000000037-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:44 np0005538338.novalocal chronyd[783]: Selected source 167.160.187.12 (2.centos.pool.ntp.org) Nov 27 19:02:45 np0005538338.novalocal python3[6317]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-43a1-cfe9-00000000003a-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:46 np0005538338.novalocal sudo[6344]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gkmcqeihhryuaxqnifwxgcmtzgqhqmce ; /usr/bin/python3' Nov 27 19:02:46 np0005538338.novalocal sudo[6344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:46 np0005538338.novalocal python3[6346]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:46 np0005538338.novalocal sudo[6344]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:46 np0005538338.novalocal python3[6371]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-000000000051-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:47 np0005538338.novalocal sudo[6404]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-djqpigoxnxmhuioubsojkuzsqatodfej ; /usr/bin/python3' Nov 27 19:02:47 np0005538338.novalocal sudo[6404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:47 np0005538338.novalocal python3[6406]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:47 np0005538338.novalocal sudo[6404]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:47 np0005538338.novalocal sudo[6482]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ttedxklanqzyoklnwgfcraohglxzcdwr ; /usr/bin/python3' Nov 27 19:02:47 np0005538338.novalocal sudo[6482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:48 np0005538338.novalocal python3[6484]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 27 19:02:48 np0005538338.novalocal sudo[6482]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:48 np0005538338.novalocal sudo[6555]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jnpqqfhfmlsznpkbwavmwyzmwwivmhyz ; /usr/bin/python3' Nov 27 19:02:48 np0005538338.novalocal sudo[6555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:48 np0005538338.novalocal python3[6557]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1764288167.5726783-85-211276697071152/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 27 19:02:48 np0005538338.novalocal sudo[6555]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:48 np0005538338.novalocal sudo[6606]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oejtwyxajuvstzxdngdgwbhdowwpakdc ; /usr/bin/python3' Nov 27 19:02:48 np0005538338.novalocal sudo[6606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:02:49 np0005538338.novalocal python3[6608]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-000000000064-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:02:49 np0005538338.novalocal sudo[6606]: pam_unix(sudo:session): session closed for user root Nov 27 19:02:50 np0005538338.novalocal python3[6637]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Nov 27 19:02:50 np0005538338.novalocal sshd-session[6630]: Received disconnect from 193.46.255.159 port 43250:11: [preauth] Nov 27 19:02:50 np0005538338.novalocal sshd-session[6630]: Disconnected from authenticating user root 193.46.255.159 port 43250 [preauth] Nov 27 19:02:56 np0005538338.novalocal python3[6672]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="antelope" PHASE="release" PROJECT="rdoinfo" DIST_VER="9" case $PROJECT in rdoinfo) REPO="cloud${DIST_VER}-openstack-$RELEASE-$PHASE" ;; nfvinfo) REPO="nfv${DIST_VER}-openvswitch-2-$PHASE" ;; esac # Find out if it is puppet or packstack and scenario if [[ "periodic-cloudsig-antelope-release-puppet-scenario005-centos9" == *"puppet"* ]]; then project="puppet-openstack" elif [[ "periodic-cloudsig-antelope-release-puppet-scenario005-centos9" == *"tcib-container-build"* ]]; then project="tcib-container-build" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF case $PHASE in testing) REPOS_URL="http://trunk.rdoproject.org/centos9-${O_RELEASE}/puppet-passed-ci/delorean.repo,https://trunk.rdoproject.org/centos9-${O_RELEASE}/delorean-deps.repo" # noqa 204 ADDITIONAL_OPTS="" ;; release) if [ $RELEASE = $MASTER ]; then REPOS_URL="http://trunk.rdoproject.org/centos9-master/puppet-passed-ci/delorean.repo,https://trunk.rdoproject.org/centos9-master/delorean-deps.repo" # noqa 204 ADDITIONAL_OPTS="" else REPOS_URL="$TEMP_REPO_URL" ADDITIONAL_OPTS="-e stable_repositories=centos-release-openstack-${RELEASE} -e testing_repository=false" fi ;; esac tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=true \ $ADDITIONAL_OPTS _uses_shell=True zuul_log_id=fa163ef9-e89a-43a1-cfe9-00000000000d-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:05 np0005538338.novalocal sudo[6957]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-euoucvdryhovbjmajmngksoxsoszaiks ; /usr/bin/python3' Nov 27 19:04:05 np0005538338.novalocal sudo[6957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:06 np0005538338.novalocal python3[6959]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Nov 27 19:04:06 np0005538338.novalocal sudo[6957]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:06 np0005538338.novalocal sudo[6996]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dklsdzzsxpkbnylazkcdwjopqadvczvf ; /usr/bin/python3' Nov 27 19:04:06 np0005538338.novalocal sudo[6996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:06 np0005538338.novalocal python3[6998]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:06 np0005538338.novalocal python3[6998]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Nov 27 19:04:06 np0005538338.novalocal sudo[6999]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Nov 27 19:04:06 np0005538338.novalocal sudo[6999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:04:07 np0005538338.novalocal sudo[6999]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:07 np0005538338.novalocal sudo[6996]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:07 np0005538338.novalocal sudo[7009]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pvjjgpvhiswaltoghqawosaljgttfjme ; /usr/bin/python3' Nov 27 19:04:07 np0005538338.novalocal sudo[7009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:07 np0005538338.novalocal python3[7011]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Nov 27 19:04:07 np0005538338.novalocal sudo[7009]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:08 np0005538338.novalocal sudo[7020]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gyttrqfarwtqpnkrbqqfnakpdalxwekl ; /usr/bin/python3' Nov 27 19:04:08 np0005538338.novalocal sudo[7020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:08 np0005538338.novalocal python3[7022]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:04:09 np0005538338.novalocal sudo[7020]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:09 np0005538338.novalocal sudo[7038]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uramspjgfilwgxjbqbaoxnagkdewgupo ; /usr/bin/python3' Nov 27 19:04:09 np0005538338.novalocal sudo[7038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:09 np0005538338.novalocal python3[7040]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:04:11 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:11 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:12 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:12 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:12 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:12 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:04:12 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:04:12 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:04:12 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:04:12 np0005538338.novalocal systemd-rc-local-generator[7113]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:04:12 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:04:14 np0005538338.novalocal sudo[7038]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:14 np0005538338.novalocal sudo[8514]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zbocmcjsgtpyqcvvcdlwlhneqyvlbwwh ; /usr/bin/python3' Nov 27 19:04:14 np0005538338.novalocal sudo[8514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:14 np0005538338.novalocal python3[8543]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Nov 27 19:04:14 np0005538338.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Nov 27 19:04:15 np0005538338.novalocal systemd[1]: Starting Authorization Manager... Nov 27 19:04:15 np0005538338.novalocal polkitd[9509]: Started polkitd version 0.117 Nov 27 19:04:15 np0005538338.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Nov 27 19:04:15 np0005538338.novalocal sudo[8514]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:15 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:04:15 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:04:15 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 2 rules Nov 27 19:04:15 np0005538338.novalocal polkitd[9509]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 27 19:04:15 np0005538338.novalocal systemd[1]: Started Authorization Manager. Nov 27 19:04:15 np0005538338.novalocal sudo[9664]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pqrjctjsmmptxdpnmvdzzvyblupgyfjt ; /usr/bin/python3' Nov 27 19:04:15 np0005538338.novalocal sudo[9664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:15 np0005538338.novalocal python3[9693]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:15 np0005538338.novalocal sudo[9664]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:15 np0005538338.novalocal sudo[10099]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dwdnnjdagcxnnayfurkxvxibdpatbxdv ; /usr/bin/python3' Nov 27 19:04:15 np0005538338.novalocal sudo[10099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:15 np0005538338.novalocal python3[10123]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:17 np0005538338.novalocal sudo[10099]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:17 np0005538338.novalocal sudo[11441]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eoennvjeexalpcupvjwfoojwfrmarvmc ; /usr/bin/python3' Nov 27 19:04:17 np0005538338.novalocal sudo[11441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:17 np0005538338.novalocal python3[11454]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Nov 27 19:04:17 np0005538338.novalocal sudo[11441]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:17 np0005538338.novalocal sudo[11613]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yzorsmabwgfqdsfgjmbppehxtvjmwehu ; /usr/bin/python3' Nov 27 19:04:17 np0005538338.novalocal sudo[11613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:17 np0005538338.novalocal python3[11628]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Nov 27 19:04:17 np0005538338.novalocal sudo[11613]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:18 np0005538338.novalocal sudo[12095]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oidltoemdecnhhrnijapnexigrnnuzjb ; /usr/bin/python3' Nov 27 19:04:18 np0005538338.novalocal sudo[12095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:18 np0005538338.novalocal python3[12115]: ansible-dnf Invoked with name=['centos-release-openstack-antelope'] state=present disable_gpg_check=True allow_downgrade=False autoremove=False bugfix=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:04:19 np0005538338.novalocal sudo[12095]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:19 np0005538338.novalocal sudo[13077]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ctxnqhpqgdhxnksgjvucptxibayrmdil ; /usr/bin/python3' Nov 27 19:04:19 np0005538338.novalocal sudo[13077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:20 np0005538338.novalocal python3[13087]: ansible-command Invoked with _raw_params=yum-config-manager --disable rdo-trunk-antelope-tested\* warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:20 np0005538338.novalocal sudo[13077]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:20 np0005538338.novalocal sudo[13140]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jqtjisfuqvdhkjurizdddjttabsjwnpg ; /usr/bin/python3' Nov 27 19:04:20 np0005538338.novalocal sudo[13140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:20 np0005538338.novalocal python3[13149]: ansible-command Invoked with _raw_params=IS_CEPH_INSTALLED=$(rpm -qa | grep centos-release-ceph) if [ -n ${IS_CEPH_INSTALLED} ]; then dnf install -y 'dnf-command(config-manager)' dnf config-manager --enable crb dnf install -y epel-release dnf config-manager --disable epel-next dnf config-manager --disable epel-cisco-openh264 dnf config-manager --setopt epel.priority=100 --save epel dnf config-manager --setopt epel.includepkgs="libarrow*,parquet*,python3-asyncssh,re2,python3-grpcio,grpc*,abseil*" --save epel fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:04:27 np0005538338.novalocal systemd-rc-local-generator[16107]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:04:27 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:04:30 np0005538338.novalocal sudo[13140]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:30 np0005538338.novalocal sudo[16935]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vwnewkciycqkrcnhqhkytnwxumotxzat ; /usr/bin/python3' Nov 27 19:04:30 np0005538338.novalocal sudo[16935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:30 np0005538338.novalocal python3[16949]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:04:30 np0005538338.novalocal python3[16949]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Nov 27 19:04:30 np0005538338.novalocal sudo[16935]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:31 np0005538338.novalocal sudo[17196]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-worlehqfvoiwcstebcjdkfhstrqksior ; /usr/bin/python3' Nov 27 19:04:31 np0005538338.novalocal sudo[17196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:04:31 np0005538338.novalocal python3[17205]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:04:42 np0005538338.novalocal systemd[4082]: Starting Mark boot as successful... Nov 27 19:04:42 np0005538338.novalocal systemd[4082]: Finished Mark boot as successful. Nov 27 19:04:53 np0005538338.novalocal irqbalance[794]: Cannot change IRQ 26 affinity: Operation not permitted Nov 27 19:04:53 np0005538338.novalocal irqbalance[794]: IRQ 26 affinity is now unmanaged Nov 27 19:04:59 np0005538338.novalocal sudo[17196]: pam_unix(sudo:session): session closed for user root Nov 27 19:04:59 np0005538338.novalocal sudo[25833]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-checwblfrnrbtceciswybvshmnquaouu ; /usr/bin/python3' Nov 27 19:04:59 np0005538338.novalocal sudo[25833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:05:00 np0005538338.novalocal python3[25835]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:05:07 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:05:07 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:05:07 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 2.597s CPU time. Nov 27 19:05:07 np0005538338.novalocal systemd[1]: run-r8c710b6219ce4e71b75ae0677ed37af3.service: Deactivated successfully. Nov 27 19:05:15 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:05:15 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:03 np0005538338.novalocal groupadd[44761]: group added to /etc/group: name=rtkit, GID=172 Nov 27 19:06:03 np0005538338.novalocal groupadd[44761]: group added to /etc/gshadow: name=rtkit Nov 27 19:06:03 np0005538338.novalocal groupadd[44761]: new group: name=rtkit, GID=172 Nov 27 19:06:03 np0005538338.novalocal useradd[44769]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Nov 27 19:06:03 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:03 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:03 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:05 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:05 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: Converting 451 SID table entries... Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:06:17 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:06:26 np0005538338.novalocal groupadd[44840]: group added to /etc/group: name=geoclue, GID=993 Nov 27 19:06:26 np0005538338.novalocal groupadd[44840]: group added to /etc/gshadow: name=geoclue Nov 27 19:06:26 np0005538338.novalocal groupadd[44840]: new group: name=geoclue, GID=993 Nov 27 19:06:26 np0005538338.novalocal useradd[44847]: new user: name=geoclue, UID=993, GID=993, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=2 res=1 Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 3 rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 3 rules Nov 27 19:06:26 np0005538338.novalocal groupadd[44859]: group added to /etc/group: name=flatpak, GID=992 Nov 27 19:06:26 np0005538338.novalocal groupadd[44859]: group added to /etc/gshadow: name=flatpak Nov 27 19:06:26 np0005538338.novalocal groupadd[44859]: new group: name=flatpak, GID=992 Nov 27 19:06:26 np0005538338.novalocal useradd[44866]: new user: name=flatpak, UID=992, GID=992, home=/, shell=/usr/sbin/nologin, from=none Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 4 rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:06:26 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 4 rules Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Stopping OpenSSH server daemon... Nov 27 19:06:28 np0005538338.novalocal sshd[1006]: Received signal 15; terminating. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: sshd.service: Deactivated successfully. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Stopped OpenSSH server daemon. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Stopped target sshd-keygen.target. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Stopping sshd-keygen.target... Nov 27 19:06:28 np0005538338.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:06:28 np0005538338.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:06:28 np0005538338.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Reached target sshd-keygen.target. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Starting OpenSSH server daemon... Nov 27 19:06:28 np0005538338.novalocal sshd[44907]: Server listening on 0.0.0.0 port 22. Nov 27 19:06:28 np0005538338.novalocal sshd[44907]: Server listening on :: port 22. Nov 27 19:06:28 np0005538338.novalocal systemd[1]: Started OpenSSH server daemon. Nov 27 19:06:29 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:06:29 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:06:29 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:06:29 np0005538338.novalocal systemd-rc-local-generator[44997]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:06:29 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:06:33 np0005538338.novalocal sudo[25833]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:33 np0005538338.novalocal sudo[48853]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ooymclgeqhocdbexzqcugjitcjhvlxun ; /usr/bin/python3' Nov 27 19:06:33 np0005538338.novalocal sudo[48853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:33 np0005538338.novalocal python3[48886]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:06:37 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:06:37 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:06:37 np0005538338.novalocal systemd-rc-local-generator[52072]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:06:38 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:06:40 np0005538338.novalocal sudo[48853]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:40 np0005538338.novalocal sudo[53351]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gugkzycsrflghlzbwwlpsbeefvgnosiy ; /usr/bin/python3' Nov 27 19:06:40 np0005538338.novalocal sudo[53351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:41 np0005538338.novalocal python3[53353]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Nov 27 19:06:41 np0005538338.novalocal sudo[53351]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:41 np0005538338.novalocal sudo[53360]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jxtepykelcwplklpiwnhkfozlixxzvle ; /usr/bin/python3' Nov 27 19:06:41 np0005538338.novalocal sudo[53360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:41 np0005538338.novalocal python3[53362]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:06:41 np0005538338.novalocal systemd-rc-local-generator[53482]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Starting Resets System Activity Logs... Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Finished Resets System Activity Logs. Nov 27 19:06:41 np0005538338.novalocal sudo[53360]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:41 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 13.303s CPU time. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: run-r41dcc1edbedf46309928ce57d6208fa4.service: Deactivated successfully. Nov 27 19:06:41 np0005538338.novalocal systemd[1]: run-r97db0d4061df456ab614116fa7357af0.service: Deactivated successfully. Nov 27 19:06:41 np0005538338.novalocal sudo[53606]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-snmpwtdjtqvzlyehhupcgddineetwirr ; /usr/bin/python3' Nov 27 19:06:41 np0005538338.novalocal sudo[53606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:42 np0005538338.novalocal python3[53608]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005538338 np0005538338.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Nov 27 19:06:42 np0005538338.novalocal sudo[53606]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:42 np0005538338.novalocal sudo[53615]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zienebntujygtbkuoacinipdoalfpzzh ; /usr/bin/python3' Nov 27 19:06:42 np0005538338.novalocal sudo[53615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:42 np0005538338.novalocal python3[53617]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:06:45 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:06:45 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:06:46 np0005538338.novalocal sudo[53615]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:46 np0005538338.novalocal sudo[53942]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lzviszxppgytkwniuszzcjlordstartn ; /usr/bin/python3' Nov 27 19:06:46 np0005538338.novalocal sudo[53942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:46 np0005538338.novalocal python3[53944]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Nov 27 19:06:46 np0005538338.novalocal python3[53944]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Nov 27 19:06:48 np0005538338.novalocal sudo[53942]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:48 np0005538338.novalocal sudo[53954]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jhbghioopbpxzhcofvbfnwyvkqhqthjy ; /usr/bin/python3' Nov 27 19:06:48 np0005538338.novalocal sudo[53954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:48 np0005538338.novalocal python3[53956]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Nov 27 19:06:48 np0005538338.novalocal python3[53956]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Nov 27 19:06:48 np0005538338.novalocal sudo[53954]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:48 np0005538338.novalocal sudo[53966]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qrtkatvcpkgpnfaihbpjehonxoeqeesh ; /usr/bin/python3' Nov 27 19:06:48 np0005538338.novalocal sudo[53966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:48 np0005538338.novalocal python3[53968]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=unmaintained/2023.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Nov 27 19:06:49 np0005538338.novalocal sudo[53966]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:50 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:06:50 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:06:50 np0005538338.novalocal systemd[1]: run-r4c940bffd180429b9c404555505f85c4.service: Deactivated successfully. Nov 27 19:06:50 np0005538338.novalocal sudo[54000]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fzxnkxhhjbxdsjgoxvvrwaopsxzmocrk ; /usr/bin/python3' Nov 27 19:06:50 np0005538338.novalocal sudo[54000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:50 np0005538338.novalocal python3[54002]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Nov 27 19:06:50 np0005538338.novalocal sudo[54000]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:50 np0005538338.novalocal sudo[54009]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bjotroxccnrutqluouqkpmujnvmyhmbi ; /usr/bin/python3' Nov 27 19:06:50 np0005538338.novalocal sudo[54009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:50 np0005538338.novalocal python3[54011]: ansible-command Invoked with _raw_params=grep ^mod /tmp/puppet-openstack/Puppetfile |egrep -v 'cloudkitty|monasca|apt|python|postgresql|ssh_keygen|git_resource' |awk '{print $2}'|sed "s/[,']//g"|while read p; do printf puppet-$p,; done|sed 's/,$//' _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 27 19:06:50 np0005538338.novalocal sudo[54009]: pam_unix(sudo:session): session closed for user root Nov 27 19:06:50 np0005538338.novalocal sudo[54026]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mpeovtzddxtiqddhzhgndwyzfvlaolvo ; /usr/bin/python3' Nov 27 19:06:50 np0005538338.novalocal sudo[54026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:06:51 np0005538338.novalocal python3[54028]: ansible-dnf Invoked with name=['puppet-aodh', 'puppet-barbican', 'puppet-ceilometer', 'puppet-ceph', 'puppet-cinder', 'puppet-designate', 'puppet-glance', 'puppet-gnocchi', 'puppet-heat', 'puppet-horizon', 'puppet-ironic', 'puppet-keystone', 'puppet-magnum', 'puppet-manila', 'puppet-mistral', 'puppet-neutron', 'puppet-nova', 'puppet-octavia', 'puppet-openstack_extras', 'puppet-openstacklib', 'puppet-oslo', 'puppet-ovn', 'puppet-placement', 'puppet-swift', 'puppet-tempest', 'puppet-trove', 'puppet-vswitch', 'puppet-vitrage', 'puppet-watcher', 'puppet-zaqar', 'puppet-kmod', 'puppet-apache', 'puppet-concat', 'puppet-firewall', 'puppet-inifile', 'puppet-mysql', 'puppet-rabbitmq', 'puppet-rsync', 'puppet-stdlib', 'puppet-vcsrepo', 'puppet-xinetd', 'puppet-memcached', 'puppet-dns', 'puppet-archive', 'puppet-corosync', 'puppet-redis'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 27 19:06:58 np0005538338.novalocal groupadd[54100]: group added to /etc/group: name=puppet, GID=52 Nov 27 19:06:58 np0005538338.novalocal groupadd[54100]: group added to /etc/gshadow: name=puppet Nov 27 19:06:58 np0005538338.novalocal groupadd[54100]: new group: name=puppet, GID=52 Nov 27 19:06:58 np0005538338.novalocal useradd[54107]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Nov 27 19:07:01 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:07:01 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:07:01 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:07:17 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:07:17 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:07:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:07:17 np0005538338.novalocal systemd-rc-local-generator[54147]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:07:17 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:07:21 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:07:21 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:07:21 np0005538338.novalocal systemd[1]: run-rc5682fff4f3843bdace87293dfcc9f71.service: Deactivated successfully. Nov 27 19:07:22 np0005538338.novalocal sudo[54026]: pam_unix(sudo:session): session closed for user root Nov 27 19:07:22 np0005538338.novalocal sudo[54768]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xgdjcorrktfknexilqzfsaprxrbcrufq ; /usr/bin/python3' Nov 27 19:07:22 np0005538338.novalocal sudo[54768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:07:23 np0005538338.novalocal python3[54770]: ansible-file Invoked with path=/etc/puppet/environments state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Nov 27 19:07:23 np0005538338.novalocal sudo[54768]: pam_unix(sudo:session): session closed for user root Nov 27 19:07:23 np0005538338.novalocal sudo[54777]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mkzshcgrfgmidhfqayvhddaseahuzxhl ; /usr/bin/python3' Nov 27 19:07:23 np0005538338.novalocal sudo[54777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:07:23 np0005538338.novalocal python3[54779]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Nov 27 19:07:23 np0005538338.novalocal sudo[54777]: pam_unix(sudo:session): session closed for user root Nov 27 19:07:23 np0005538338.novalocal sudo[54786]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xnshjspkqfbtvetcqhpryldsdtenkpyw ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Nov 27 19:07:23 np0005538338.novalocal sudo[54786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:07:23 np0005538338.novalocal python3[54788]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Nov 27 19:07:42 np0005538338.novalocal systemd[4082]: Created slice User Background Tasks Slice. Nov 27 19:07:42 np0005538338.novalocal systemd[4082]: Starting Cleanup of User's Temporary Files and Directories... Nov 27 19:07:42 np0005538338.novalocal systemd[4082]: Finished Cleanup of User's Temporary Files and Directories. Nov 27 19:08:16 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:08:16 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:08:16 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:08:16 np0005538338.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:6 across:13387756k Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: Converting 484 SID table entries... Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:08:48 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:08:50 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=3 res=1 Nov 27 19:08:50 np0005538338.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Nov 27 19:08:50 np0005538338.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Nov 27 19:08:50 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:08:50 np0005538338.novalocal systemd-rc-local-generator[55483]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:08:55 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:08:55 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:09:01 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:09:01 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:09:01 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:09:01 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:09:01 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:09:02 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:09:02 np0005538338.novalocal systemd-rc-local-generator[55725]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:09:02 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:09:08 np0005538338.novalocal dbus-broker-launch[774]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Nov 27 19:09:08 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:09:08 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:09:08 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.804s CPU time. Nov 27 19:09:08 np0005538338.novalocal systemd[1]: run-rd2d2684510f24e81bb54461865ea0f9e.service: Deactivated successfully. Nov 27 19:10:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:10:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:10:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:10:14 np0005538338.novalocal setsebool[61437]: The virt_use_nfs policy boolean was changed to 1 by root Nov 27 19:10:14 np0005538338.novalocal setsebool[61437]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: Converting 517 SID table entries... Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:10:26 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:11:16 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=5 res=1 Nov 27 19:11:16 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:11:16 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:11:16 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: Converting 2734 SID table entries... Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:11:34 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:12:00 np0005538338.novalocal sshd-session[62394]: Received disconnect from 193.46.255.7 port 48122:11: [preauth] Nov 27 19:12:00 np0005538338.novalocal sshd-session[62394]: Disconnected from authenticating user root 193.46.255.7 port 48122 [preauth] Nov 27 19:12:14 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=7 res=1 Nov 27 19:12:14 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:12:14 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:12:14 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:12:14 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:12:14 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:12:15 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:12:15 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:12:15 np0005538338.novalocal systemd[1]: run-r58adddfcaf13414f8654d63f098cfce5.service: Deactivated successfully. Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: Converting 2734 SID table entries... Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:12:27 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:12:28 np0005538338.novalocal groupadd[62497]: group added to /etc/group: name=memcached, GID=989 Nov 27 19:12:28 np0005538338.novalocal groupadd[62497]: group added to /etc/gshadow: name=memcached Nov 27 19:12:28 np0005538338.novalocal groupadd[62497]: new group: name=memcached, GID=989 Nov 27 19:12:28 np0005538338.novalocal useradd[62504]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Nov 27 19:12:29 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=8 res=1 Nov 27 19:12:29 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:12:29 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:12:29 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:29 np0005538338.novalocal systemd-rc-local-generator[62936]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:29 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:12:30 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:12:30 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:12:30 np0005538338.novalocal systemd[1]: run-r6e43c2384f574a29a75000fd8cd26b00.service: Deactivated successfully. Nov 27 19:12:30 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:30 np0005538338.novalocal systemd-rc-local-generator[63106]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:30 np0005538338.novalocal systemd[1]: Started memcached daemon. Nov 27 19:12:30 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:31 np0005538338.novalocal systemd-rc-local-generator[63150]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:31 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:31 np0005538338.novalocal systemd-rc-local-generator[63179]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:36 np0005538338.novalocal groupadd[63246]: group added to /etc/group: name=epmd, GID=988 Nov 27 19:12:36 np0005538338.novalocal groupadd[63246]: group added to /etc/gshadow: name=epmd Nov 27 19:12:36 np0005538338.novalocal groupadd[63246]: new group: name=epmd, GID=988 Nov 27 19:12:36 np0005538338.novalocal useradd[63253]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Nov 27 19:12:37 np0005538338.novalocal groupadd[63262]: group added to /etc/group: name=rabbitmq, GID=987 Nov 27 19:12:37 np0005538338.novalocal groupadd[63262]: group added to /etc/gshadow: name=rabbitmq Nov 27 19:12:37 np0005538338.novalocal groupadd[63262]: new group: name=rabbitmq, GID=987 Nov 27 19:12:37 np0005538338.novalocal useradd[63269]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Nov 27 19:12:38 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:39 np0005538338.novalocal systemd-rc-local-generator[63296]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:39 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:12:39 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:12:39 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:12:39 np0005538338.novalocal systemd-rc-local-generator[63337]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:12:40 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:12:40 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:12:40 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:12:40 np0005538338.novalocal systemd[1]: run-rffdb65549b644ea5ac9056e902d7d3d5.service: Deactivated successfully. Nov 27 19:12:43 np0005538338.novalocal runuser[64196]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:12:44 np0005538338.novalocal runuser[64196]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: Converting 2740 SID table entries... Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:13:00 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:13:01 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=9 res=1 Nov 27 19:13:01 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:13:01 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:13:01 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:13:01 np0005538338.novalocal groupadd[64707]: group added to /etc/group: name=mysql, GID=27 Nov 27 19:13:01 np0005538338.novalocal groupadd[64707]: group added to /etc/gshadow: name=mysql Nov 27 19:13:01 np0005538338.novalocal groupadd[64707]: new group: name=mysql, GID=27 Nov 27 19:13:01 np0005538338.novalocal useradd[64714]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Nov 27 19:13:03 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:13:03 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:13:03 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:03 np0005538338.novalocal systemd-rc-local-generator[65192]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:03 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:13:08 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:13:08 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:13:08 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 5.782s CPU time. Nov 27 19:13:08 np0005538338.novalocal systemd[1]: run-r9f39461803604f40be0152a91250a1ef.service: Deactivated successfully. Nov 27 19:13:09 np0005538338.novalocal groupadd[68519]: group added to /etc/group: name=unbound, GID=986 Nov 27 19:13:09 np0005538338.novalocal groupadd[68519]: group added to /etc/gshadow: name=unbound Nov 27 19:13:09 np0005538338.novalocal groupadd[68519]: new group: name=unbound, GID=986 Nov 27 19:13:09 np0005538338.novalocal useradd[68526]: new user: name=unbound, UID=986, GID=986, home=/var/lib/unbound, shell=/sbin/nologin, from=none Nov 27 19:13:09 np0005538338.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: Converting 2745 SID table entries... Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:13:19 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:13:19 np0005538338.novalocal groupadd[68557]: group added to /etc/group: name=openvswitch, GID=985 Nov 27 19:13:19 np0005538338.novalocal groupadd[68557]: group added to /etc/gshadow: name=openvswitch Nov 27 19:13:19 np0005538338.novalocal groupadd[68557]: new group: name=openvswitch, GID=985 Nov 27 19:13:20 np0005538338.novalocal useradd[68564]: new user: name=openvswitch, UID=985, GID=985, home=/, shell=/sbin/nologin, from=none Nov 27 19:13:20 np0005538338.novalocal groupadd[68572]: group added to /etc/group: name=hugetlbfs, GID=984 Nov 27 19:13:20 np0005538338.novalocal groupadd[68572]: group added to /etc/gshadow: name=hugetlbfs Nov 27 19:13:20 np0005538338.novalocal groupadd[68572]: new group: name=hugetlbfs, GID=984 Nov 27 19:13:20 np0005538338.novalocal usermod[68580]: add 'openvswitch' to group 'hugetlbfs' Nov 27 19:13:20 np0005538338.novalocal usermod[68580]: add 'openvswitch' to shadow group 'hugetlbfs' Nov 27 19:13:21 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=10 res=1 Nov 27 19:13:21 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:13:21 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:13:21 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:22 np0005538338.novalocal systemd-rc-local-generator[69051]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:22 np0005538338.novalocal systemd-sysv-generator[69055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:22 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:13:23 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:13:23 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:13:23 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.195s CPU time. Nov 27 19:13:23 np0005538338.novalocal systemd[1]: run-r6dd2295f623145689f27937aceacf90e.service: Deactivated successfully. Nov 27 19:13:23 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:23 np0005538338.novalocal systemd-rc-local-generator[69652]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:23 np0005538338.novalocal systemd-sysv-generator[69658]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:23 np0005538338.novalocal systemd[1]: Starting Open vSwitch Database Unit... Nov 27 19:13:23 np0005538338.novalocal chown[69668]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Nov 27 19:13:23 np0005538338.novalocal ovs-ctl[69673]: /etc/openvswitch/conf.db does not exist ... (warning). Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69673]: Creating empty database /etc/openvswitch/conf.db [ OK ] Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69673]: Starting ovsdb-server [ OK ] Nov 27 19:13:24 np0005538338.novalocal ovs-vsctl[69722]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Nov 27 19:13:24 np0005538338.novalocal ovs-vsctl[69742]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"5523cd4c-1127-484f-a692-9fcefc902e5b\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69673]: Configuring Open vSwitch system IDs [ OK ] Nov 27 19:13:24 np0005538338.novalocal ovs-vsctl[69746]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005538338 Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69673]: Enabling remote OVSDB managers [ OK ] Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Started Open vSwitch Database Unit. Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Nov 27 19:13:24 np0005538338.novalocal kernel: openvswitch: Open vSwitch switching datapath Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69792]: Inserting openvswitch module [ OK ] Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69761]: Starting ovs-vswitchd [ OK ] Nov 27 19:13:24 np0005538338.novalocal ovs-vsctl[69808]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005538338 Nov 27 19:13:24 np0005538338.novalocal ovs-ctl[69761]: Enabling remote OVSDB managers [ OK ] Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Starting Open vSwitch... Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Finished Open vSwitch. Nov 27 19:13:24 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:24 np0005538338.novalocal systemd-rc-local-generator[69830]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:24 np0005538338.novalocal systemd-sysv-generator[69836]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:25 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:25 np0005538338.novalocal systemd-rc-local-generator[69859]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:25 np0005538338.novalocal systemd-sysv-generator[69862]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:27 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:13:27 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:13:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:27 np0005538338.novalocal systemd-rc-local-generator[69928]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:27 np0005538338.novalocal systemd-sysv-generator[69931]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:27 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:13:28 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:13:28 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:13:28 np0005538338.novalocal systemd[1]: run-red1ab9587a44430c8ea00350f60038b6.service: Deactivated successfully. Nov 27 19:13:31 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:13:31 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:13:31 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:13:31 np0005538338.novalocal systemd-sysv-generator[70355]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:13:31 np0005538338.novalocal systemd-rc-local-generator[70350]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:13:31 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:13:31 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:13:31 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:13:31 np0005538338.novalocal systemd[1]: run-r8187e4f4d9374cf4b04c3b6eedf88805.service: Deactivated successfully. Nov 27 19:13:32 np0005538338.novalocal ovs-vsctl[70423]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Nov 27 19:13:32 np0005538338.novalocal ovs-vsctl[70425]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Nov 27 19:13:32 np0005538338.novalocal ovs-vsctl[70427]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70430]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005538338.novalocal Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70432]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70434]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70436]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70438]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70440]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70442]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70446]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Nov 27 19:13:33 np0005538338.novalocal ovs-vsctl[70450]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Nov 27 19:13:47 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:13:47 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:13:47 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:13:47 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:13:47 np0005538338.novalocal systemd[1]: run-re3dba66e16314c70bf6e99a5fc4c907a.service: Deactivated successfully. Nov 27 19:14:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:14:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:14:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:14:00 np0005538338.novalocal groupadd[70752]: group added to /etc/group: name=keystone, GID=163 Nov 27 19:14:00 np0005538338.novalocal groupadd[70752]: group added to /etc/gshadow: name=keystone Nov 27 19:14:00 np0005538338.novalocal groupadd[70752]: new group: name=keystone, GID=163 Nov 27 19:14:00 np0005538338.novalocal useradd[70759]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Nov 27 19:14:01 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:14:01 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:14:02 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:14:02 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:14:02 np0005538338.novalocal systemd[1]: run-r29e9366b0e0140958cbab17ecf94ac91.service: Deactivated successfully. Nov 27 19:14:03 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:14:03 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:14:04 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:14:04 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:14:04 np0005538338.novalocal systemd[1]: run-rd4df3073dbb641d2af767284de2153f4.service: Deactivated successfully. Nov 27 19:14:13 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:13 np0005538338.novalocal systemd-rc-local-generator[71557]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:13 np0005538338.novalocal systemd-sysv-generator[71561]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:13 np0005538338.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Nov 27 19:14:14 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:14 np0005538338.novalocal systemd-rc-local-generator[71590]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:14 np0005538338.novalocal systemd-sysv-generator[71593]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:14 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:14 np0005538338.novalocal systemd-rc-local-generator[71619]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:14 np0005538338.novalocal systemd-sysv-generator[71624]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:15 np0005538338.novalocal systemd-logind[802]: Watching system buttons on /dev/input/event0 (Power Button) Nov 27 19:14:15 np0005538338.novalocal systemd-logind[802]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Nov 27 19:14:15 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:15 np0005538338.novalocal systemd-rc-local-generator[71714]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:15 np0005538338.novalocal systemd-sysv-generator[71721]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:16 np0005538338.novalocal systemd[1]: Starting dnf makecache... Nov 27 19:14:16 np0005538338.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Nov 27 19:14:16 np0005538338.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Nov 27 19:14:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:16 np0005538338.novalocal systemd-sysv-generator[71755]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:16 np0005538338.novalocal systemd-rc-local-generator[71752]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:16 np0005538338.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: Updating Subscription Management repositories. Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: Unable to read consumer identity Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: This system is not registered with an entitlement server. You can use subscription-manager to register. Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: Failed determining last makecache time. Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: CentOS-9-stream - Ceph Quincy 37 kB/s | 12 kB 00:00 Nov 27 19:14:16 np0005538338.novalocal dnf[71727]: CentOS-9 - RabbitMQ 38 74 kB/s | 9.1 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS Stream 9 - NFV OpenvSwitch 22 kB/s | 2.4 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS-9 - OpenStack antelope 78 kB/s | 9.2 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS Stream 9 - BaseOS 932 kB/s | 3.9 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS Stream 9 - AppStream 1.0 MB/s | 4.4 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS Stream 9 - CRB 1.0 MB/s | 4.3 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: CentOS Stream 9 - Extras packages 775 kB/s | 3.0 kB 00:00 Nov 27 19:14:17 np0005538338.novalocal dnf[71727]: Metadata cache created. Nov 27 19:14:17 np0005538338.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Nov 27 19:14:17 np0005538338.novalocal systemd[1]: Finished dnf makecache. Nov 27 19:14:19 np0005538338.novalocal groupadd[71774]: group added to /etc/group: name=cinder, GID=165 Nov 27 19:14:19 np0005538338.novalocal groupadd[71774]: group added to /etc/gshadow: name=cinder Nov 27 19:14:19 np0005538338.novalocal groupadd[71774]: new group: name=cinder, GID=165 Nov 27 19:14:19 np0005538338.novalocal useradd[71781]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Nov 27 19:14:19 np0005538338.novalocal useradd[71781]: add 'cinder' to group 'nobody' Nov 27 19:14:19 np0005538338.novalocal useradd[71781]: add 'cinder' to group 'cinder' Nov 27 19:14:19 np0005538338.novalocal useradd[71781]: add 'cinder' to shadow group 'nobody' Nov 27 19:14:19 np0005538338.novalocal useradd[71781]: add 'cinder' to shadow group 'cinder' Nov 27 19:14:20 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:14:20 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:14:20 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:20 np0005538338.novalocal systemd-sysv-generator[71833]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:20 np0005538338.novalocal systemd-rc-local-generator[71828]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:21 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:14:23 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:14:23 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:14:23 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.312s CPU time. Nov 27 19:14:23 np0005538338.novalocal systemd[1]: run-rb026cbb86964411e96d83c352d74bc7d.service: Deactivated successfully. Nov 27 19:14:23 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:23 np0005538338.novalocal systemd-rc-local-generator[74243]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:23 np0005538338.novalocal systemd-sysv-generator[74247]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:24 np0005538338.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Starting Open-iSCSI... Nov 27 19:14:24 np0005538338.novalocal kernel: Loading iSCSI transport class v2.0-870. Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Started Open-iSCSI. Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:24 np0005538338.novalocal systemd-sysv-generator[74285]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:24 np0005538338.novalocal systemd-rc-local-generator[74280]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:24 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:24 np0005538338.novalocal systemd-sysv-generator[74318]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:24 np0005538338.novalocal systemd-rc-local-generator[74314]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:27 np0005538338.novalocal groupadd[74340]: group added to /etc/group: name=glance, GID=161 Nov 27 19:14:27 np0005538338.novalocal groupadd[74340]: group added to /etc/gshadow: name=glance Nov 27 19:14:27 np0005538338.novalocal groupadd[74340]: new group: name=glance, GID=161 Nov 27 19:14:27 np0005538338.novalocal useradd[74347]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Nov 27 19:14:28 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:28 np0005538338.novalocal systemd-rc-local-generator[74380]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:28 np0005538338.novalocal systemd-sysv-generator[74385]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:28 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: Converting 2764 SID table entries... Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:14:31 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:14:31 np0005538338.novalocal setsebool[74396]: The os_neutron_dac_override policy boolean was changed to on by root Nov 27 19:14:31 np0005538338.novalocal ovs-vsctl[74403]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Nov 27 19:14:31 np0005538338.novalocal kernel: ovs-system: entered promiscuous mode Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.4237] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Nov 27 19:14:31 np0005538338.novalocal kernel: Timeout policy base is empty Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.4260] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Nov 27 19:14:31 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=12 res=1 Nov 27 19:14:31 np0005538338.novalocal systemd-udevd[74418]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.4782] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Nov 27 19:14:31 np0005538338.novalocal kernel: br-ex: entered promiscuous mode Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.4798] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Nov 27 19:14:31 np0005538338.novalocal systemd-udevd[74420]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.5093] device (br-ex): carrier: link connected Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.5583] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Nov 27 19:14:31 np0005538338.novalocal systemd-udevd[74423]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:14:31 np0005538338.novalocal ovs-vsctl[74432]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl -- --id=@iface0 create Interface name=loop1 -- add-port br-ex loop1 interfaces=@iface0 Nov 27 19:14:31 np0005538338.novalocal kernel: loop1: entered promiscuous mode Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.8105] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74441 uid=0 result="success" Nov 27 19:14:31 np0005538338.novalocal ifdown[74442]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:31 np0005538338.novalocal ifdown[74443]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:31 np0005538338.novalocal ifdown[74444]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.8481] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74450 uid=0 result="success" Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.8844] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74458 uid=0 result="success" Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.9140] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74467 uid=0 result="success" Nov 27 19:14:31 np0005538338.novalocal NetworkManager[858]: [1764288871.9899] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74490 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ovs-vsctl[74495]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Nov 27 19:14:32 np0005538338.novalocal kernel: loop1: left promiscuous mode Nov 27 19:14:32 np0005538338.novalocal kernel: br-ex: left promiscuous mode Nov 27 19:14:32 np0005538338.novalocal kernel: ovs-system: left promiscuous mode Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.0991] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74513 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ifdown[74517]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:32 np0005538338.novalocal ifdown[74518]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:32 np0005538338.novalocal ifdown[74519]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.1512] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74525 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.2072] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74536 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.2544] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74548 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.3638] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74574 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ovs-vsctl[74582]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.4625] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74589 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ifup[74593]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:32 np0005538338.novalocal ifup[74594]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:32 np0005538338.novalocal ifup[74595]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.5178] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74601 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.5852] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74613 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ifup[74614]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:32 np0005538338.novalocal ifup[74615]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:32 np0005538338.novalocal ifup[74616]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6238] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74622 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ovs-vsctl[74624]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6531] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Nov 27 19:14:32 np0005538338.novalocal kernel: ovs-system: entered promiscuous mode Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6551] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Nov 27 19:14:32 np0005538338.novalocal kernel: No such timeout policy "ovs_test_tp" Nov 27 19:14:32 np0005538338.novalocal kernel: br-ex: entered promiscuous mode Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6606] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6619] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.6850] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74645 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.7150] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74656 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.7711] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74674 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ovs-vsctl[74694]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.8369] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:14:32 np0005538338.novalocal kernel: loop1: entered promiscuous mode Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.8382] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.8635] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74701 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ifup[74702]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:32 np0005538338.novalocal ifup[74703]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:32 np0005538338.novalocal ifup[74704]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.8975] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74710 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ovs-vsctl[74714]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Nov 27 19:14:32 np0005538338.novalocal NetworkManager[858]: [1764288872.9903] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74721 uid=0 result="success" Nov 27 19:14:32 np0005538338.novalocal ifup[74722]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 27 19:14:33 np0005538338.novalocal ifup[74723]: 'network-scripts' will be removed from distribution in near future. Nov 27 19:14:33 np0005538338.novalocal ifup[74724]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 27 19:14:33 np0005538338.novalocal NetworkManager[858]: [1764288873.0300] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74730 uid=0 result="success" Nov 27 19:14:33 np0005538338.novalocal ovs-vsctl[74734]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Nov 27 19:14:33 np0005538338.novalocal NetworkManager[858]: [1764288873.1398] device (br-ex): carrier: link connected Nov 27 19:14:37 np0005538338.novalocal groupadd[74782]: group added to /etc/group: name=radvd, GID=75 Nov 27 19:14:37 np0005538338.novalocal groupadd[74782]: group added to /etc/gshadow: name=radvd Nov 27 19:14:37 np0005538338.novalocal groupadd[74782]: new group: name=radvd, GID=75 Nov 27 19:14:37 np0005538338.novalocal useradd[74791]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Nov 27 19:14:38 np0005538338.novalocal groupadd[74806]: group added to /etc/group: name=haproxy, GID=983 Nov 27 19:14:38 np0005538338.novalocal groupadd[74806]: group added to /etc/gshadow: name=haproxy Nov 27 19:14:38 np0005538338.novalocal groupadd[74806]: new group: name=haproxy, GID=983 Nov 27 19:14:38 np0005538338.novalocal useradd[74813]: new user: name=haproxy, UID=984, GID=983, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Nov 27 19:14:38 np0005538338.novalocal groupadd[74825]: group added to /etc/group: name=dnsmasq, GID=982 Nov 27 19:14:38 np0005538338.novalocal groupadd[74825]: group added to /etc/gshadow: name=dnsmasq Nov 27 19:14:38 np0005538338.novalocal groupadd[74825]: new group: name=dnsmasq, GID=982 Nov 27 19:14:38 np0005538338.novalocal useradd[74832]: new user: name=dnsmasq, UID=983, GID=982, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Nov 27 19:14:38 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:14:38 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:14:42 np0005538338.novalocal groupadd[74844]: group added to /etc/group: name=neutron, GID=981 Nov 27 19:14:42 np0005538338.novalocal groupadd[74844]: group added to /etc/gshadow: name=neutron Nov 27 19:14:42 np0005538338.novalocal groupadd[74844]: new group: name=neutron, GID=981 Nov 27 19:14:42 np0005538338.novalocal useradd[74851]: new user: name=neutron, UID=982, GID=981, home=/var/lib/neutron, shell=/sbin/nologin, from=none Nov 27 19:14:43 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:14:43 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:14:43 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:43 np0005538338.novalocal systemd-rc-local-generator[74906]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:43 np0005538338.novalocal systemd-sysv-generator[74910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:44 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:14:44 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:14:44 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:14:44 np0005538338.novalocal systemd[1]: run-re8d56654711946cba356defbe6ff8367.service: Deactivated successfully. Nov 27 19:14:49 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:14:50 np0005538338.novalocal systemd-rc-local-generator[75485]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:14:50 np0005538338.novalocal systemd-sysv-generator[75488]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:14:50 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:14:51 np0005538338.novalocal ovs-vsctl[75498]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Nov 27 19:14:56 np0005538338.novalocal groupadd[75517]: group added to /etc/group: name=placement, GID=980 Nov 27 19:14:56 np0005538338.novalocal groupadd[75517]: group added to /etc/gshadow: name=placement Nov 27 19:14:56 np0005538338.novalocal groupadd[75517]: new group: name=placement, GID=980 Nov 27 19:14:56 np0005538338.novalocal useradd[75524]: new user: name=placement, UID=981, GID=980, home=/, shell=/bin/bash, from=none Nov 27 19:15:06 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:15:06 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:15:06 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:15:07 np0005538338.novalocal groupadd[75556]: group added to /etc/group: name=nova, GID=162 Nov 27 19:15:07 np0005538338.novalocal groupadd[75556]: group added to /etc/gshadow: name=nova Nov 27 19:15:07 np0005538338.novalocal groupadd[75556]: new group: name=nova, GID=162 Nov 27 19:15:07 np0005538338.novalocal useradd[75563]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Nov 27 19:15:07 np0005538338.novalocal useradd[75563]: add 'nova' to group 'nobody' Nov 27 19:15:07 np0005538338.novalocal useradd[75563]: add 'nova' to group 'nova' Nov 27 19:15:07 np0005538338.novalocal useradd[75563]: add 'nova' to shadow group 'nobody' Nov 27 19:15:07 np0005538338.novalocal useradd[75563]: add 'nova' to shadow group 'nova' Nov 27 19:15:10 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:15:10 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:15:11 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:15:11 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:15:11 np0005538338.novalocal systemd[1]: run-rbbea0028017c47ee949fc48228208e37.service: Deactivated successfully. Nov 27 19:15:13 np0005538338.novalocal groupadd[75788]: group added to /etc/group: name=libvirt, GID=979 Nov 27 19:15:13 np0005538338.novalocal groupadd[75788]: group added to /etc/gshadow: name=libvirt Nov 27 19:15:13 np0005538338.novalocal groupadd[75788]: new group: name=libvirt, GID=979 Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 5 rules Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Reloading rules Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Collecting garbage unconditionally... Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Loading rules from directory /etc/polkit-1/rules.d Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 27 19:15:14 np0005538338.novalocal polkitd[9509]: Finished loading, compiling and executing 5 rules Nov 27 19:15:14 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:15:14 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:15:15 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:15:15 np0005538338.novalocal systemd-sysv-generator[75920]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:15:15 np0005538338.novalocal systemd-rc-local-generator[75916]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:15:15 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:15:15 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:15:15 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:15:15 np0005538338.novalocal systemd[1]: run-r62cf010b80294129838b12dae75e7d42.service: Deactivated successfully. Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: Converting 2773 SID table entries... Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:15:33 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: Converting 2773 SID table entries... Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:15:45 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: Converting 2773 SID table entries... Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:15:57 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: Converting 2773 SID table entries... Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:16:08 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:16:16 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=16 res=1 Nov 27 19:16:16 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:16:16 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:16:16 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: Converting 2773 SID table entries... Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:16:19 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: Converting 2774 SID table entries... Nov 27 19:16:31 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=17 res=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability network_peer_controls=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability open_perms=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability extended_socket_class=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability always_check_network=0 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 27 19:16:31 np0005538338.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 27 19:16:31 np0005538338.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Nov 27 19:16:32 np0005538338.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Nov 27 19:16:32 np0005538338.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Nov 27 19:16:32 np0005538338.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=18 res=1 Nov 27 19:16:32 np0005538338.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Nov 27 19:16:32 np0005538338.novalocal groupadd[76529]: group added to /etc/group: name=qemu, GID=107 Nov 27 19:16:32 np0005538338.novalocal groupadd[76529]: group added to /etc/gshadow: name=qemu Nov 27 19:16:32 np0005538338.novalocal groupadd[76529]: new group: name=qemu, GID=107 Nov 27 19:16:32 np0005538338.novalocal useradd[76536]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Nov 27 19:16:32 np0005538338.novalocal useradd[76536]: add 'qemu' to group 'kvm' Nov 27 19:16:32 np0005538338.novalocal useradd[76536]: add 'qemu' to shadow group 'kvm' Nov 27 19:16:33 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:16:33 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:16:33 np0005538338.novalocal dbus-broker-launch[766]: Noticed file-system modification, trigger reload. Nov 27 19:16:37 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:16:37 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:16:37 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:16:37 np0005538338.novalocal systemd-rc-local-generator[77169]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:16:37 np0005538338.novalocal systemd-sysv-generator[77173]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:16:37 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:16:42 np0005538338.novalocal groupadd[80301]: group added to /etc/group: name=octavia, GID=978 Nov 27 19:16:42 np0005538338.novalocal groupadd[80301]: group added to /etc/gshadow: name=octavia Nov 27 19:16:42 np0005538338.novalocal groupadd[80301]: new group: name=octavia, GID=978 Nov 27 19:16:42 np0005538338.novalocal useradd[80342]: new user: name=octavia, UID=980, GID=978, home=/var/lib/octavia, shell=/sbin/nologin, from=none Nov 27 19:16:42 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:16:42 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:16:42 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.220s CPU time. Nov 27 19:16:42 np0005538338.novalocal systemd[1]: run-r0de62cd7350a4804bad7d571ce29ef58.service: Deactivated successfully. Nov 27 19:16:49 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:16:49 np0005538338.novalocal systemd-rc-local-generator[80565]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:16:49 np0005538338.novalocal systemd-sysv-generator[80569]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:16:49 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:16:54 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:16:54 np0005538338.novalocal systemd-rc-local-generator[80614]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:16:54 np0005538338.novalocal systemd-sysv-generator[80620]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:16:54 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:16:57 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:16:57 np0005538338.novalocal systemd-rc-local-generator[80659]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:16:57 np0005538338.novalocal systemd-sysv-generator[80663]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:16:57 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:17:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:17:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:17:00 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:00 np0005538338.novalocal systemd-rc-local-generator[80698]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:00 np0005538338.novalocal systemd-sysv-generator[80705]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:00 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:03 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:03 np0005538338.novalocal systemd-rc-local-generator[80740]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:03 np0005538338.novalocal systemd-sysv-generator[80746]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:03 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:18 np0005538338.novalocal groupadd[80855]: group added to /etc/group: name=apache, GID=48 Nov 27 19:17:18 np0005538338.novalocal groupadd[80855]: group added to /etc/gshadow: name=apache Nov 27 19:17:18 np0005538338.novalocal groupadd[80855]: new group: name=apache, GID=48 Nov 27 19:17:18 np0005538338.novalocal useradd[80864]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Nov 27 19:17:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:27 np0005538338.novalocal systemd-rc-local-generator[80898]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:27 np0005538338.novalocal systemd-sysv-generator[80902]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:28 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:17:28 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:17:29 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:29 np0005538338.novalocal systemd-rc-local-generator[80941]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:29 np0005538338.novalocal systemd-sysv-generator[80946]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:29 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:30 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:17:30 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:17:30 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.011s CPU time. Nov 27 19:17:30 np0005538338.novalocal systemd[1]: run-r1052faea20b6472fa6c6a85c02efccbe.service: Deactivated successfully. Nov 27 19:17:37 np0005538338.novalocal groupadd[81286]: group added to /etc/group: name=manila, GID=977 Nov 27 19:17:37 np0005538338.novalocal groupadd[81286]: group added to /etc/gshadow: name=manila Nov 27 19:17:37 np0005538338.novalocal groupadd[81286]: new group: name=manila, GID=977 Nov 27 19:17:37 np0005538338.novalocal useradd[81293]: new user: name=manila, UID=979, GID=977, home=/var/lib/manila, shell=/sbin/nologin, from=none Nov 27 19:17:37 np0005538338.novalocal useradd[81293]: add 'manila' to group 'nobody' Nov 27 19:17:37 np0005538338.novalocal useradd[81293]: add 'manila' to group 'manila' Nov 27 19:17:37 np0005538338.novalocal useradd[81293]: add 'manila' to shadow group 'nobody' Nov 27 19:17:37 np0005538338.novalocal useradd[81293]: add 'manila' to shadow group 'manila' Nov 27 19:17:39 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:17:39 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:17:39 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:39 np0005538338.novalocal systemd-rc-local-generator[81336]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:39 np0005538338.novalocal systemd-sysv-generator[81340]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:39 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:39 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:17:39 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:17:39 np0005538338.novalocal systemd[1]: run-r2a0f41af6db341cba191527a6e6b6369.service: Deactivated successfully. Nov 27 19:17:40 np0005538338.novalocal sshd-session[81499]: Received disconnect from 193.46.255.159 port 49916:11: [preauth] Nov 27 19:17:40 np0005538338.novalocal sshd-session[81499]: Disconnected from authenticating user root 193.46.255.159 port 49916 [preauth] Nov 27 19:17:43 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:17:43 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:17:43 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:17:43 np0005538338.novalocal systemd-sysv-generator[81556]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:17:43 np0005538338.novalocal systemd-rc-local-generator[81550]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:17:43 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:17:44 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:17:44 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:17:44 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.105s CPU time. Nov 27 19:17:44 np0005538338.novalocal systemd[1]: run-r9ddfd5e26f2a494a95a4366a77de43e9.service: Deactivated successfully. Nov 27 19:17:44 np0005538338.novalocal kernel: loop: module loaded Nov 27 19:17:44 np0005538338.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Nov 27 19:17:45 np0005538338.novalocal lvm[81995]: PV /dev/loop3 not used. Nov 27 19:17:45 np0005538338.novalocal lvm[81998]: PV /dev/loop3 online, VG lvm-shares is complete. Nov 27 19:17:45 np0005538338.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Nov 27 19:17:45 np0005538338.novalocal lvm[82000]: 0 logical volume(s) in volume group "lvm-shares" now active Nov 27 19:17:45 np0005538338.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Nov 27 19:18:03 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:18:03 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:18:03 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:18:03 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:18:03 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:18:04 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:18:04 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:18:04 np0005538338.novalocal systemd[1]: run-r6e0865cd647b4377907d00d6b1bfefce.service: Deactivated successfully. Nov 27 19:18:13 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:13 np0005538338.novalocal systemd-rc-local-generator[82336]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:13 np0005538338.novalocal systemd-sysv-generator[82341]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:14 np0005538338.novalocal systemd[1]: Starting MariaDB 10.5 database server... Nov 27 19:18:14 np0005538338.novalocal mariadb-prepare-db-dir[82370]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Nov 27 19:18:14 np0005538338.novalocal mariadb-prepare-db-dir[82370]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Nov 27 19:18:14 np0005538338.novalocal systemd[1]: Started MariaDB 10.5 database server. Nov 27 19:18:14 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:14 np0005538338.novalocal systemd-rc-local-generator[82482]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:14 np0005538338.novalocal systemd-sysv-generator[82488]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:14 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:14 np0005538338.novalocal systemd-rc-local-generator[82507]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:14 np0005538338.novalocal systemd-sysv-generator[82510]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:15 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:15 np0005538338.novalocal systemd-rc-local-generator[82592]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:15 np0005538338.novalocal systemd-sysv-generator[82596]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:16 np0005538338.novalocal systemd[1]: Starting OVN northd management daemon... Nov 27 19:18:16 np0005538338.novalocal chown[82602]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82705]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82707]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82706]: ovs|00002|vlog(monitor)|INFO|closing log file Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82706]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: Starting ovsdb-nb [ OK ] Nov 27 19:18:16 np0005538338.novalocal ovn-nbctl[82711]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82731]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82733]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82732]: ovs|00002|vlog(monitor)|INFO|closing log file Nov 27 19:18:16 np0005538338.novalocal ovsdb-server[82732]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: Starting ovsdb-sb [ OK ] Nov 27 19:18:16 np0005538338.novalocal ovn-sbctl[82737]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Nov 27 19:18:16 np0005538338.novalocal ovn-ctl[82603]: Starting ovn-northd [ OK ] Nov 27 19:18:16 np0005538338.novalocal systemd[1]: Finished OVN northd management daemon. Nov 27 19:18:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:17 np0005538338.novalocal systemd-rc-local-generator[82772]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:17 np0005538338.novalocal systemd-sysv-generator[82775]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:17 np0005538338.novalocal systemd-rc-local-generator[82804]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:17 np0005538338.novalocal systemd-sysv-generator[82808]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:17 np0005538338.novalocal ovn-nbctl[82815]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Nov 27 19:18:17 np0005538338.novalocal ovn-sbctl[82819]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Nov 27 19:18:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:18 np0005538338.novalocal systemd-rc-local-generator[82869]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:18 np0005538338.novalocal systemd-sysv-generator[82872]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: Starting OVN controller daemon... Nov 27 19:18:18 np0005538338.novalocal ovn-ctl[82877]: Starting ovn-controller [ OK ] Nov 27 19:18:18 np0005538338.novalocal systemd[1]: Started OVN controller daemon. Nov 27 19:18:18 np0005538338.novalocal kernel: br-int: entered promiscuous mode Nov 27 19:18:18 np0005538338.novalocal NetworkManager[858]: [1764289098.7997] manager: (br-int): 'openvswitch' plugin not available; creating generic device Nov 27 19:18:18 np0005538338.novalocal NetworkManager[858]: [1764289098.8023] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Nov 27 19:18:18 np0005538338.novalocal systemd-udevd[82934]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:18:18 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:18 np0005538338.novalocal systemd-rc-local-generator[82951]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:19 np0005538338.novalocal systemd-sysv-generator[82955]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:19 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:19 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:19 np0005538338.novalocal systemd-rc-local-generator[82986]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:19 np0005538338.novalocal systemd-sysv-generator[82989]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:19 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:21 np0005538338.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Nov 27 19:18:22 np0005538338.novalocal lvm[83007]: PV /dev/loop2 not used. Nov 27 19:18:22 np0005538338.novalocal lvm[83010]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:18:22 np0005538338.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Nov 27 19:18:22 np0005538338.novalocal lvm[83012]: 0 logical volume(s) in volume group "cinder-volumes" now active Nov 27 19:18:22 np0005538338.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Nov 27 19:18:26 np0005538338.novalocal ovsdb-server[82707]: ovs|00003|memory|INFO|10368 kB peak resident set size after 10.0 seconds Nov 27 19:18:26 np0005538338.novalocal ovsdb-server[82707]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Nov 27 19:18:26 np0005538338.novalocal ovsdb-server[82733]: ovs|00003|memory|INFO|11016 kB peak resident set size after 10.0 seconds Nov 27 19:18:26 np0005538338.novalocal ovsdb-server[82733]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Nov 27 19:18:33 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:33 np0005538338.novalocal systemd-rc-local-generator[83052]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:33 np0005538338.novalocal systemd-sysv-generator[83055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:33 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:33 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:18:36 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:36 np0005538338.novalocal systemd-rc-local-generator[83096]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:36 np0005538338.novalocal systemd-sysv-generator[83101]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:36 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:36 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:18:40 np0005538338.novalocal groupadd[83152]: group added to /etc/group: name=clevis, GID=976 Nov 27 19:18:40 np0005538338.novalocal groupadd[83152]: group added to /etc/gshadow: name=clevis Nov 27 19:18:40 np0005538338.novalocal groupadd[83152]: new group: name=clevis, GID=976 Nov 27 19:18:40 np0005538338.novalocal useradd[83159]: new user: name=clevis, UID=978, GID=976, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Nov 27 19:18:40 np0005538338.novalocal usermod[83169]: add 'clevis' to group 'tss' Nov 27 19:18:40 np0005538338.novalocal usermod[83169]: add 'clevis' to shadow group 'tss' Nov 27 19:18:41 np0005538338.novalocal usermod[83182]: add 'nova' to group 'qemu' Nov 27 19:18:41 np0005538338.novalocal usermod[83182]: add 'nova' to shadow group 'qemu' Nov 27 19:18:41 np0005538338.novalocal usermod[83189]: add 'nova' to group 'libvirt' Nov 27 19:18:41 np0005538338.novalocal usermod[83189]: add 'nova' to shadow group 'libvirt' Nov 27 19:18:42 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:18:42 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:18:42 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:42 np0005538338.novalocal systemd-rc-local-generator[83261]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:42 np0005538338.novalocal systemd-sysv-generator[83265]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:42 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:42 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:18:46 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:46 np0005538338.novalocal systemd-rc-local-generator[85535]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:46 np0005538338.novalocal systemd-sysv-generator[85538]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:46 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:46 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:18:50 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.391s CPU time. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: run-r9eb7606123994105807163f683d0ecaa.service: Deactivated successfully. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:18:50 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:50 np0005538338.novalocal systemd-sysv-generator[87173]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:50 np0005538338.novalocal systemd-rc-local-generator[87170]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:18:50 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:18:51 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:18:51 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:18:51 np0005538338.novalocal systemd[1]: run-r63ce2cace877456c844ebd63f53d4745.service: Deactivated successfully. Nov 27 19:18:53 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:18:53 np0005538338.novalocal systemd-sysv-generator[87358]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:18:53 np0005538338.novalocal systemd-rc-local-generator[87355]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:18:53 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:19:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:19:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:19:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:19:14 np0005538338.novalocal crontab[87410]: (root) LIST (root) Nov 27 19:19:14 np0005538338.novalocal crontab[87411]: (root) LIST (keystone) Nov 27 19:19:14 np0005538338.novalocal crontab[87412]: (root) LIST (cinder) Nov 27 19:19:14 np0005538338.novalocal crontab[87413]: (root) LIST (glance) Nov 27 19:19:14 np0005538338.novalocal crontab[87414]: (root) LIST (nova) Nov 27 19:19:14 np0005538338.novalocal crontab[87415]: (root) LIST (manila) Nov 27 19:19:15 np0005538338.novalocal crontab[87416]: (root) REPLACE (cinder) Nov 27 19:19:20 np0005538338.novalocal crontab[87428]: (root) REPLACE (glance) Nov 27 19:19:33 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:19:33 np0005538338.novalocal systemd-rc-local-generator[87473]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:19:33 np0005538338.novalocal systemd-sysv-generator[87478]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:19:33 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:19:33 np0005538338.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Nov 27 19:19:34 np0005538338.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Nov 27 19:19:34 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:19:34 np0005538338.novalocal systemd-rc-local-generator[87505]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:19:34 np0005538338.novalocal systemd-sysv-generator[87508]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:19:34 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:19:34 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:19:34 np0005538338.novalocal systemd-rc-local-generator[87539]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:19:34 np0005538338.novalocal systemd-sysv-generator[87543]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:19:34 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:00 np0005538338.novalocal crontab[87581]: (root) REPLACE (nova) Nov 27 19:20:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:20:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:20:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:20:08 np0005538338.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 27 19:20:08 np0005538338.novalocal systemd[1]: Starting man-db-cache-update.service... Nov 27 19:20:08 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:08 np0005538338.novalocal systemd-rc-local-generator[87627]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:08 np0005538338.novalocal systemd-sysv-generator[87632]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:09 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:09 np0005538338.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Nov 27 19:20:09 np0005538338.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 27 19:20:09 np0005538338.novalocal systemd[1]: Finished man-db-cache-update.service. Nov 27 19:20:09 np0005538338.novalocal systemd[1]: run-r3a0b694478f84196aca970b1a925fa24.service: Deactivated successfully. Nov 27 19:20:19 np0005538338.novalocal crontab[87728]: (root) REPLACE (manila) Nov 27 19:20:19 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:19 np0005538338.novalocal systemd-rc-local-generator[87745]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:19 np0005538338.novalocal systemd-sysv-generator[87749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:19 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:20 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:20 np0005538338.novalocal systemd-sysv-generator[87787]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:20 np0005538338.novalocal systemd-rc-local-generator[87782]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:20 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:20 np0005538338.novalocal systemd[87791]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Nov 27 19:20:20 np0005538338.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Nov 27 19:20:20 np0005538338.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Nov 27 19:20:20 np0005538338.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Nov 27 19:20:20 np0005538338.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Nov 27 19:20:20 np0005538338.novalocal systemd[1]: Starting RabbitMQ broker... Nov 27 19:20:21 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:21.330841-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Nov 27 19:20:21 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:21.346798-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Nov 27 19:20:21 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:21.346836-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.923929-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924009-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924037-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924068-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924132-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924156-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924185-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Nov 27 19:20:22 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:22.924241-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:23.181679-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: 2025-11-27 19:20:23.181842-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: ## ## RabbitMQ 3.9.21 Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: ## ## Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: ###### ## Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Erlang: 24.3.4.2 [jit] Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Doc guides: https://rabbitmq.com/documentation.html Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Support: https://rabbitmq.com/contact.html Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Tutorials: https://rabbitmq.com/getstarted.html Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Monitoring: https://rabbitmq.com/monitoring.html Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Nov 27 19:20:23 np0005538338.novalocal rabbitmq-server[87792]: Config file(s): /etc/rabbitmq/rabbitmq.config Nov 27 19:20:26 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:20:26 np0005538338.novalocal rabbitmq-server[87792]: Starting broker... completed with 3 plugins. Nov 27 19:20:26 np0005538338.novalocal systemd[1]: Started RabbitMQ broker. Nov 27 19:20:26 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:26 np0005538338.novalocal systemd-rc-local-generator[87896]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:26 np0005538338.novalocal systemd-sysv-generator[87900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:26 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:26 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:20:26 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:27 np0005538338.novalocal systemd-sysv-generator[87933]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:27 np0005538338.novalocal systemd-rc-local-generator[87929]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:27 np0005538338.novalocal setroubleshoot[87875]: failed to retrieve rpm info for path '/proc/net/if_inet6': Nov 27 19:20:27 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:27 np0005538338.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Nov 27 19:20:27 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Nov 27 19:20:27 np0005538338.novalocal runuser[87945]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:28 np0005538338.novalocal runuser[87945]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:28 np0005538338.novalocal runuser[88001]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:28 np0005538338.novalocal setroubleshoot[87875]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 771512b2-3619-4005-bca2-72468208f31c Nov 27 19:20:28 np0005538338.novalocal setroubleshoot[87875]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Nov 27 19:20:28 np0005538338.novalocal runuser[88001]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:28 np0005538338.novalocal runuser[88054]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:29 np0005538338.novalocal runuser[88054]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:29 np0005538338.novalocal runuser[88108]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:30 np0005538338.novalocal runuser[88108]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:30 np0005538338.novalocal runuser[88162]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:31 np0005538338.novalocal runuser[88162]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:31 np0005538338.novalocal runuser[88214]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:31 np0005538338.novalocal runuser[88214]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:32 np0005538338.novalocal runuser[88266]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:32 np0005538338.novalocal runuser[88266]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:32 np0005538338.novalocal runuser[88318]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:33 np0005538338.novalocal runuser[88318]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:33 np0005538338.novalocal runuser[88372]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:34 np0005538338.novalocal runuser[88372]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:34 np0005538338.novalocal runuser[88424]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:34 np0005538338.novalocal runuser[88424]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:34 np0005538338.novalocal runuser[88476]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:35 np0005538338.novalocal runuser[88476]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:35 np0005538338.novalocal runuser[88528]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:36 np0005538338.novalocal runuser[88528]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:36 np0005538338.novalocal runuser[88582]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:36 np0005538338.novalocal runuser[88582]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:36 np0005538338.novalocal runuser[88634]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:37 np0005538338.novalocal runuser[88634]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:37 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Nov 27 19:20:37 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.284s CPU time. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:38 np0005538338.novalocal systemd-rc-local-generator[88711]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:38 np0005538338.novalocal systemd-sysv-generator[88714]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:38 np0005538338.novalocal systemd-sysv-generator[88745]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:38 np0005538338.novalocal systemd-rc-local-generator[88742]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:38 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:39 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:39 np0005538338.novalocal systemd-rc-local-generator[88772]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:39 np0005538338.novalocal systemd-sysv-generator[88778]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:39 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:39 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:39 np0005538338.novalocal systemd-sysv-generator[88809]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:39 np0005538338.novalocal systemd-rc-local-generator[88806]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:40 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:40 np0005538338.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Nov 27 19:20:40 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:40 np0005538338.novalocal systemd-rc-local-generator[88838]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:40 np0005538338.novalocal systemd-sysv-generator[88841]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:40 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:40 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:40 np0005538338.novalocal systemd-rc-local-generator[88872]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:40 np0005538338.novalocal systemd-sysv-generator[88875]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:41 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:41 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:41 np0005538338.novalocal systemd-sysv-generator[88908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:41 np0005538338.novalocal systemd-rc-local-generator[88903]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:41 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:41 np0005538338.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:42 np0005538338.novalocal systemd-rc-local-generator[88937]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:42 np0005538338.novalocal systemd-sysv-generator[88940]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:42 np0005538338.novalocal systemd-rc-local-generator[88975]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:42 np0005538338.novalocal systemd-sysv-generator[88979]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:42 np0005538338.novalocal sudo[88953]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Created slice User Slice of UID 0. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Nov 27 19:20:42 np0005538338.novalocal systemd[1]: Starting User Manager for UID 0... Nov 27 19:20:42 np0005538338.novalocal systemd[88985]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Queued start job for default target Main User Target. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Created slice User Application Slice. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Started Daily Cleanup of User's Temporary Directories. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Reached target Paths. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Reached target Timers. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Starting D-Bus User Message Bus Socket... Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Starting Create User's Volatile Files and Directories... Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Finished Create User's Volatile Files and Directories. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Listening on D-Bus User Message Bus Socket. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Reached target Sockets. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Reached target Basic System. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Reached target Main User Target. Nov 27 19:20:43 np0005538338.novalocal systemd[88985]: Startup finished in 244ms. Nov 27 19:20:43 np0005538338.novalocal systemd-rc-local-generator[89018]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:43 np0005538338.novalocal systemd-sysv-generator[89022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:43 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Started User Manager for UID 0. Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Started Session c1 of User root. Nov 27 19:20:43 np0005538338.novalocal sudo[88953]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Nov 27 19:20:43 np0005538338.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Nov 27 19:20:43 np0005538338.novalocal target[89029]: No saved config file at /etc/target/saveconfig.json, ok, exiting Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Nov 27 19:20:43 np0005538338.novalocal sudo[88953]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:43 np0005538338.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Nov 27 19:20:43 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:43 np0005538338.novalocal systemd-sysv-generator[89064]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:43 np0005538338.novalocal systemd-rc-local-generator[89061]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:43 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:44 np0005538338.novalocal sudo[89039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Nov 27 19:20:44 np0005538338.novalocal systemd[1]: Started Session c2 of User root. Nov 27 19:20:44 np0005538338.novalocal sudo[89039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:44 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:44 np0005538338.novalocal systemd-rc-local-generator[89091]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:44 np0005538338.novalocal systemd-sysv-generator[89095]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:44 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:44 np0005538338.novalocal sudo[89039]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:44 np0005538338.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Nov 27 19:20:44 np0005538338.novalocal runuser[89100]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:44 np0005538338.novalocal sudo[89109]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:44 np0005538338.novalocal systemd[1]: Started Session c3 of User root. Nov 27 19:20:44 np0005538338.novalocal sudo[89109]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:45 np0005538338.novalocal sudo[89109]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:45 np0005538338.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Nov 27 19:20:45 np0005538338.novalocal sudo[89150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Nov 27 19:20:45 np0005538338.novalocal systemd[1]: Started Session c4 of User root. Nov 27 19:20:45 np0005538338.novalocal sudo[89150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:45 np0005538338.novalocal runuser[89100]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:45 np0005538338.novalocal runuser[89160]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:45 np0005538338.novalocal systemd[1]: Started Device-mapper event daemon. Nov 27 19:20:45 np0005538338.novalocal dmeventd[89238]: dmeventd ready for processing. Nov 27 19:20:45 np0005538338.novalocal dmeventd[89238]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Nov 27 19:20:45 np0005538338.novalocal lvm[89243]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:20:45 np0005538338.novalocal lvm[89243]: VG cinder-volumes finished Nov 27 19:20:45 np0005538338.novalocal sudo[89150]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:45 np0005538338.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Nov 27 19:20:45 np0005538338.novalocal sudo[89247]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Nov 27 19:20:45 np0005538338.novalocal systemd[1]: Started Session c5 of User root. Nov 27 19:20:45 np0005538338.novalocal sudo[89247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:46 np0005538338.novalocal runuser[89160]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:46 np0005538338.novalocal runuser[89258]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:46 np0005538338.novalocal sudo[89247]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:46 np0005538338.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Nov 27 19:20:46 np0005538338.novalocal sudo[89305]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Nov 27 19:20:46 np0005538338.novalocal systemd[1]: Started Session c6 of User root. Nov 27 19:20:46 np0005538338.novalocal sudo[89305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:46 np0005538338.novalocal runuser[89258]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:46 np0005538338.novalocal sudo[89305]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:46 np0005538338.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Nov 27 19:20:46 np0005538338.novalocal runuser[89316]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:46 np0005538338.novalocal sudo[89318]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:46 np0005538338.novalocal systemd[1]: Started Session c7 of User root. Nov 27 19:20:46 np0005538338.novalocal sudo[89318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:47 np0005538338.novalocal sudo[89318]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:47 np0005538338.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Nov 27 19:20:47 np0005538338.novalocal sudo[89365]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:47 np0005538338.novalocal systemd[1]: Started Session c8 of User root. Nov 27 19:20:47 np0005538338.novalocal sudo[89365]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:47 np0005538338.novalocal runuser[89316]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:47 np0005538338.novalocal sudo[89365]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:47 np0005538338.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Nov 27 19:20:47 np0005538338.novalocal sudo[89377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:47 np0005538338.novalocal systemd[1]: Started Session c9 of User root. Nov 27 19:20:47 np0005538338.novalocal sudo[89377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:47 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:47 np0005538338.novalocal systemd-sysv-generator[89404]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:48 np0005538338.novalocal systemd-rc-local-generator[89400]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:48 np0005538338.novalocal sudo[89377]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:48 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:48 np0005538338.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Nov 27 19:20:48 np0005538338.novalocal sudo[89412]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:20:48 np0005538338.novalocal systemd[1]: Started Session c10 of User root. Nov 27 19:20:48 np0005538338.novalocal sudo[89412]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:48 np0005538338.novalocal systemd[1]: Started OpenStack Image Service (code-named Glance) API server. Nov 27 19:20:48 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:48 np0005538338.novalocal sudo[89412]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:48 np0005538338.novalocal systemd-rc-local-generator[89440]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:48 np0005538338.novalocal systemd-sysv-generator[89443]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:48 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:48 np0005538338.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Nov 27 19:20:48 np0005538338.novalocal sudo[89449]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Nov 27 19:20:48 np0005538338.novalocal systemd[1]: Started Session c11 of User root. Nov 27 19:20:48 np0005538338.novalocal sudo[89449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:48 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:48 np0005538338.novalocal systemd-rc-local-generator[89473]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:48 np0005538338.novalocal systemd-sysv-generator[89476]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:48 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:49 np0005538338.novalocal sudo[89449]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:49 np0005538338.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Nov 27 19:20:49 np0005538338.novalocal runuser[89482]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:49 np0005538338.novalocal sudo[89495]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Nov 27 19:20:49 np0005538338.novalocal systemd[1]: Started Session c12 of User root. Nov 27 19:20:49 np0005538338.novalocal sudo[89495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:49 np0005538338.novalocal sudo[89495]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:49 np0005538338.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Nov 27 19:20:49 np0005538338.novalocal sudo[89533]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:49 np0005538338.novalocal systemd[1]: Started Session c13 of User root. Nov 27 19:20:49 np0005538338.novalocal sudo[89533]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:49 np0005538338.novalocal runuser[89482]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:49 np0005538338.novalocal runuser[89543]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:50 np0005538338.novalocal sudo[89533]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:50 np0005538338.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Nov 27 19:20:50 np0005538338.novalocal sudo[89583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:50 np0005538338.novalocal systemd[1]: Started Session c14 of User root. Nov 27 19:20:50 np0005538338.novalocal sudo[89583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:50 np0005538338.novalocal sudo[89583]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:50 np0005538338.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Nov 27 19:20:50 np0005538338.novalocal sudo[89596]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:20:50 np0005538338.novalocal systemd[1]: Started Session c15 of User root. Nov 27 19:20:50 np0005538338.novalocal sudo[89596]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:50 np0005538338.novalocal runuser[89543]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:50 np0005538338.novalocal runuser[89607]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:50 np0005538338.novalocal sudo[89596]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:50 np0005538338.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Nov 27 19:20:50 np0005538338.novalocal sudo[89653]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:50 np0005538338.novalocal systemd[1]: Started Session c16 of User root. Nov 27 19:20:50 np0005538338.novalocal sudo[89653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:51 np0005538338.novalocal sudo[89653]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:51 np0005538338.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Nov 27 19:20:51 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:20:51 np0005538338.novalocal runuser[89607]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:51 np0005538338.novalocal runuser[89666]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:51 np0005538338.novalocal sudo[89671]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:51 np0005538338.novalocal systemd[1]: Started Session c17 of User root. Nov 27 19:20:51 np0005538338.novalocal sudo[89671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:51 np0005538338.novalocal sudo[89671]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:51 np0005538338.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Nov 27 19:20:51 np0005538338.novalocal sudo[89715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:51 np0005538338.novalocal systemd[1]: Started Session c18 of User root. Nov 27 19:20:51 np0005538338.novalocal sudo[89715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:51 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:20:52 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Nov 27 19:20:52 np0005538338.novalocal sudo[89715]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:52 np0005538338.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Nov 27 19:20:52 np0005538338.novalocal runuser[89666]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:52 np0005538338.novalocal sudo[89735]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:20:52 np0005538338.novalocal systemd[1]: Started Session c19 of User root. Nov 27 19:20:52 np0005538338.novalocal sudo[89735]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:52 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:52 np0005538338.novalocal sudo[89735]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:52 np0005538338.novalocal systemd-rc-local-generator[89768]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:52 np0005538338.novalocal systemd-sysv-generator[89773]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:52 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:52 np0005538338.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Nov 27 19:20:52 np0005538338.novalocal sudo[89743]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:52 np0005538338.novalocal systemd[1]: Started Session c20 of User root. Nov 27 19:20:52 np0005538338.novalocal sudo[89743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:52 np0005538338.novalocal systemd[1]: Starting OpenStack Neutron Server... Nov 27 19:20:53 np0005538338.novalocal sudo[89743]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:53 np0005538338.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 2d2112d2-9e4f-446e-b912-397723bd16a2 Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l aaaeecfa-e5ca-4a9c-a126-e84af71d7a87 Nov 27 19:20:53 np0005538338.novalocal sudo[89781]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal systemd[1]: Started Session c21 of User root. Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 32c2753e-2208-41ac-9a7f-bf0e23551f4e Nov 27 19:20:53 np0005538338.novalocal sudo[89781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l c9ce02bb-f4fe-4849-8966-551fc31ba12f Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l a03ec797-3939-471d-ab04-80229aab91a1 Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 7977f5fa-b34c-4595-b93b-d1856565ee66 Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 638ad8c0-0e2e-4107-a35b-f81bb39017ec Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l b41e95e8-04db-434a-8e5e-4557babc023c Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l c4016478-6bb1-485c-bd3e-d0f1ba5f810f Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal sudo[89781]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:53 np0005538338.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 8733ef69-281a-45f1-b828-4eebb1722598 Nov 27 19:20:53 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Nov 27 19:20:53 np0005538338.novalocal sudo[89797]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:53 np0005538338.novalocal systemd[1]: Started Session c22 of User root. Nov 27 19:20:53 np0005538338.novalocal sudo[89797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:54 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 04343350-b134-4862-be8c-693079a2fb4d Nov 27 19:20:54 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Nov 27 19:20:54 np0005538338.novalocal sudo[89797]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:54 np0005538338.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Nov 27 19:20:54 np0005538338.novalocal sudo[89802]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:20:54 np0005538338.novalocal systemd[1]: Started Session c23 of User root. Nov 27 19:20:54 np0005538338.novalocal sudo[89802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:54 np0005538338.novalocal sudo[89802]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:54 np0005538338.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Nov 27 19:20:54 np0005538338.novalocal sudo[89806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:20:54 np0005538338.novalocal systemd[1]: Started Session c24 of User root. Nov 27 19:20:54 np0005538338.novalocal sudo[89806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:20:55 np0005538338.novalocal sudo[89806]: pam_unix(sudo:session): session closed for user root Nov 27 19:20:55 np0005538338.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Nov 27 19:20:56 np0005538338.novalocal systemd[1]: Started OpenStack Neutron Server. Nov 27 19:20:56 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 04343350-b134-4862-be8c-693079a2fb4d Nov 27 19:20:56 np0005538338.novalocal setroubleshoot[89664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Nov 27 19:20:56 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:56 np0005538338.novalocal systemd-rc-local-generator[89848]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:56 np0005538338.novalocal systemd-sysv-generator[89851]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:56 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:56 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:56 np0005538338.novalocal systemd-sysv-generator[89876]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:56 np0005538338.novalocal systemd-rc-local-generator[89873]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:56 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:57 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:57 np0005538338.novalocal systemd-rc-local-generator[89908]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:57 np0005538338.novalocal systemd-sysv-generator[89911]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:57 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:57 np0005538338.novalocal systemd[1]: Started OpenStack Neutron OVN Metadata Agent. Nov 27 19:20:57 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:58 np0005538338.novalocal systemd-rc-local-generator[89936]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:58 np0005538338.novalocal systemd-sysv-generator[89941]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:58 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:58 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:20:58 np0005538338.novalocal systemd-sysv-generator[89972]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:20:58 np0005538338.novalocal systemd-rc-local-generator[89969]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:20:58 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:20:58 np0005538338.novalocal runuser[89980]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:59 np0005538338.novalocal runuser[89980]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:20:59 np0005538338.novalocal runuser[90032]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:20:59 np0005538338.novalocal sudo[90077]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpm7m1cl6a/privsep.sock Nov 27 19:20:59 np0005538338.novalocal systemd[1]: Started Session c25 of User root. Nov 27 19:20:59 np0005538338.novalocal sudo[90077]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:21:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:21:00 np0005538338.novalocal runuser[90032]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:21:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:21:00 np0005538338.novalocal runuser[90090]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:00 np0005538338.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Nov 27 19:21:00 np0005538338.novalocal sudo[90077]: pam_unix(sudo:session): session closed for user root Nov 27 19:21:00 np0005538338.novalocal runuser[90090]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:01 np0005538338.novalocal runuser[90148]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:01 np0005538338.novalocal runuser[90148]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:02 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:02 np0005538338.novalocal systemd-rc-local-generator[90227]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:02 np0005538338.novalocal systemd-sysv-generator[90232]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:02 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:02 np0005538338.novalocal systemd[1]: Listening on libvirt locking daemon socket. Nov 27 19:21:02 np0005538338.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Nov 27 19:21:02 np0005538338.novalocal systemd[1]: Starting libvirt locking daemon... Nov 27 19:21:02 np0005538338.novalocal systemd[1]: Started libvirt locking daemon. Nov 27 19:21:03 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:03 np0005538338.novalocal systemd-sysv-generator[90261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:03 np0005538338.novalocal systemd-rc-local-generator[90257]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:03 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:03 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:03 np0005538338.novalocal systemd-rc-local-generator[90285]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:03 np0005538338.novalocal systemd-sysv-generator[90290]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:03 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:04 np0005538338.novalocal systemd-rc-local-generator[90318]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:04 np0005538338.novalocal systemd-sysv-generator[90321]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Listening on libvirt logging daemon socket. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Starting libvirt logging daemon... Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Started libvirt logging daemon. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:04 np0005538338.novalocal systemd-sysv-generator[90356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:04 np0005538338.novalocal systemd-rc-local-generator[90350]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:04 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:05 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:05 np0005538338.novalocal systemd-rc-local-generator[90382]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:05 np0005538338.novalocal systemd-sysv-generator[90387]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:05 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:05 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:06 np0005538338.novalocal systemd-rc-local-generator[90415]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:06 np0005538338.novalocal systemd-sysv-generator[90419]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.302s CPU time. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: Listening on libvirt secret daemon socket. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.623s CPU time. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:06 np0005538338.novalocal systemd-sysv-generator[90452]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:06 np0005538338.novalocal systemd-rc-local-generator[90447]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:06 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:07 np0005538338.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Nov 27 19:21:07 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:07 np0005538338.novalocal systemd-rc-local-generator[90482]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:07 np0005538338.novalocal systemd-sysv-generator[90488]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:07 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:07 np0005538338.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Nov 27 19:21:08 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:08 np0005538338.novalocal systemd-rc-local-generator[90522]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:08 np0005538338.novalocal systemd-sysv-generator[90526]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:08 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:08 np0005538338.novalocal systemd[1]: Listening on libvirt storage daemon socket. Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Starting libvirt QEMU daemon... Nov 27 19:21:09 np0005538338.novalocal systemd[1]: Started libvirt QEMU daemon. Nov 27 19:21:09 np0005538338.novalocal virtqemud[90536]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Nov 27 19:21:09 np0005538338.novalocal virtqemud[90536]: hostname: np0005538338.novalocal Nov 27 19:21:09 np0005538338.novalocal virtqemud[90536]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Nov 27 19:21:09 np0005538338.novalocal virtqemud[90536]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Nov 27 19:21:10 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:10 np0005538338.novalocal systemd-rc-local-generator[90586]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:10 np0005538338.novalocal systemd-sysv-generator[90590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:10 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:10 np0005538338.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Nov 27 19:21:10 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:10 np0005538338.novalocal systemd-rc-local-generator[90618]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:11 np0005538338.novalocal systemd-sysv-generator[90622]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:11 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:11 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:11 np0005538338.novalocal systemd-rc-local-generator[90648]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:11 np0005538338.novalocal systemd-sysv-generator[90653]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:11 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:11 np0005538338.novalocal runuser[90656]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:12 np0005538338.novalocal runuser[90656]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:12 np0005538338.novalocal runuser[90709]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:13 np0005538338.novalocal runuser[90709]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:13 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:21:13 np0005538338.novalocal runuser[90763]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:13 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:21:13 np0005538338.novalocal runuser[90763]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:13 np0005538338.novalocal runuser[90818]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:14 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Nov 27 19:21:14 np0005538338.novalocal runuser[90818]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:15 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l b6aff61b-0984-4f13-a3c5-0e64d082f1dc Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l c102b9e2-4efd-4a95-a733-fe7ff387ebc5 Nov 27 19:21:15 np0005538338.novalocal systemd-rc-local-generator[90906]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal systemd-sysv-generator[90910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 533aaa80-384c-4e63-8eff-2dae6511164f Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 2233ec34-740f-44c0-a887-e8d5de3e2d16 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 66844038-a93f-4844-ba9a-f49f8cd4e548 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 55119661-9e07-4893-917f-e98eb3388b54 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 950f85cb-3bee-4135-8fbd-1eb45eb09699 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 02a5a21d-5d49-4c0e-b2ca-10f0462b31a8 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l e1861f78-612a-4b08-ae2a-76ef732719ac Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 9cc01bf3-4531-4401-a629-c2101b91dff9 Nov 27 19:21:15 np0005538338.novalocal setroubleshoot[90762]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:21:15 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:15 np0005538338.novalocal systemd-rc-local-generator[90948]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:15 np0005538338.novalocal systemd-sysv-generator[90951]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:16 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:16 np0005538338.novalocal systemd-rc-local-generator[90978]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:16 np0005538338.novalocal systemd-sysv-generator[90981]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:16 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:17 np0005538338.novalocal systemd-rc-local-generator[91010]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:17 np0005538338.novalocal systemd-sysv-generator[91015]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:17 np0005538338.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Nov 27 19:21:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:17 np0005538338.novalocal systemd-rc-local-generator[91038]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:17 np0005538338.novalocal systemd-sysv-generator[91045]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:18 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:18 np0005538338.novalocal systemd-rc-local-generator[91072]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:18 np0005538338.novalocal systemd-sysv-generator[91076]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:18 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:18 np0005538338.novalocal systemd-sysv-generator[91105]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:18 np0005538338.novalocal systemd-rc-local-generator[91102]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:18 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:19 np0005538338.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Nov 27 19:21:19 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:19 np0005538338.novalocal systemd-sysv-generator[91142]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:19 np0005538338.novalocal systemd-rc-local-generator[91138]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:19 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:19 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:19 np0005538338.novalocal systemd-rc-local-generator[91168]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:19 np0005538338.novalocal systemd-sysv-generator[91171]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:19 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:20 np0005538338.novalocal runuser[91177]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:20 np0005538338.novalocal runuser[91177]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:20 np0005538338.novalocal runuser[91229]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:21 np0005538338.novalocal runuser[91229]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:21 np0005538338.novalocal runuser[91286]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:22 np0005538338.novalocal runuser[91286]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:22 np0005538338.novalocal runuser[91338]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:21:22 np0005538338.novalocal runuser[91338]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:21:23 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:23 np0005538338.novalocal systemd-rc-local-generator[91432]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:23 np0005538338.novalocal systemd-sysv-generator[91435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:23 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:23 np0005538338.novalocal systemd[1]: Started OpenStack Manila Scheduler. Nov 27 19:21:24 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:24 np0005538338.novalocal systemd-rc-local-generator[91464]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:24 np0005538338.novalocal systemd-sysv-generator[91467]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:24 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:24 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:24 np0005538338.novalocal systemd-sysv-generator[91495]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:24 np0005538338.novalocal systemd-rc-local-generator[91491]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:24 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:25 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:25 np0005538338.novalocal systemd-rc-local-generator[91525]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:25 np0005538338.novalocal systemd-sysv-generator[91530]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:25 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:25 np0005538338.novalocal systemd[1]: Started OpenStack Manila Share Service. Nov 27 19:21:25 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:25 np0005538338.novalocal systemd-rc-local-generator[91558]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:25 np0005538338.novalocal systemd-sysv-generator[91562]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.671s CPU time. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.283s CPU time. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:26 np0005538338.novalocal systemd-rc-local-generator[91627]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:26 np0005538338.novalocal systemd-sysv-generator[91631]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:26 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:27 np0005538338.novalocal systemd-sysv-generator[91665]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:27 np0005538338.novalocal systemd-rc-local-generator[91661]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:27 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:27 np0005538338.novalocal sudo[91672]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpnhf153iw/privsep.sock Nov 27 19:21:27 np0005538338.novalocal systemd[1]: Started Session c26 of User root. Nov 27 19:21:27 np0005538338.novalocal systemd[1]: Started OpenStack Manila Data Server. Nov 27 19:21:27 np0005538338.novalocal sudo[91672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=979) Nov 27 19:21:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:27 np0005538338.novalocal systemd-sysv-generator[91701]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:27 np0005538338.novalocal systemd-rc-local-generator[91697]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:27 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:27 np0005538338.novalocal sudo[91672]: pam_unix(sudo:session): session closed for user root Nov 27 19:21:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:28 np0005538338.novalocal systemd-rc-local-generator[91730]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:28 np0005538338.novalocal systemd-sysv-generator[91736]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:28 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:28 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:28 np0005538338.novalocal systemd-sysv-generator[91768]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:28 np0005538338.novalocal systemd-rc-local-generator[91763]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:29 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:29 np0005538338.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Nov 27 19:21:29 np0005538338.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Nov 27 19:21:29 np0005538338.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Nov 27 19:21:29 np0005538338.novalocal systemd[1]: Starting The Apache HTTP Server... Nov 27 19:21:40 np0005538338.novalocal httpd[91790]: Server configured, listening on: ::1 port 9876, ... Nov 27 19:21:40 np0005538338.novalocal systemd[1]: Started The Apache HTTP Server. Nov 27 19:21:41 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:41 np0005538338.novalocal systemd-rc-local-generator[91909]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:41 np0005538338.novalocal systemd-sysv-generator[91912]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:41 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:41 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:21:41 np0005538338.novalocal systemd-rc-local-generator[91935]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:21:41 np0005538338.novalocal systemd-sysv-generator[91938]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:21:41 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:21:41 np0005538338.novalocal crontab[91946]: (root) REPLACE (keystone) Nov 27 19:21:44 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:21:44 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:21:44 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 56a8e3f9-5deb-4ddf-8579-65f30e99ec60 Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 58deebae-372b-4c2d-a301-3d56db53d0b7 Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l ef9fb3f1-e777-419b-a7f9-8e5716d797c2 Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a': Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l b4fafab4-5b16-4c85-a788-dd5cab976f95 Nov 27 19:21:46 np0005538338.novalocal setroubleshoot[91950]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:21:56 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Nov 27 19:21:56 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.273s CPU time. Nov 27 19:21:56 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:21:56 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.139s CPU time. Nov 27 19:22:09 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:22:10 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:22:10 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:22:29 np0005538338.novalocal sudo[92035]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:22:29 np0005538338.novalocal systemd[1]: Started Session c27 of User root. Nov 27 19:22:29 np0005538338.novalocal sudo[92035]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:22:29 np0005538338.novalocal sudo[92035]: pam_unix(sudo:session): session closed for user root Nov 27 19:22:29 np0005538338.novalocal systemd[1]: session-c27.scope: Deactivated successfully. Nov 27 19:22:29 np0005538338.novalocal sudo[92039]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:22:29 np0005538338.novalocal systemd[1]: Started Session c28 of User root. Nov 27 19:22:29 np0005538338.novalocal sudo[92039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:22:29 np0005538338.novalocal sudo[92039]: pam_unix(sudo:session): session closed for user root Nov 27 19:22:29 np0005538338.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Nov 27 19:22:29 np0005538338.novalocal sudo[92044]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:22:29 np0005538338.novalocal systemd[1]: Started Session c29 of User root. Nov 27 19:22:29 np0005538338.novalocal sudo[92044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:22:30 np0005538338.novalocal sudo[92044]: pam_unix(sudo:session): session closed for user root Nov 27 19:22:30 np0005538338.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Nov 27 19:22:30 np0005538338.novalocal sudo[92048]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:22:30 np0005538338.novalocal systemd[1]: Started Session c30 of User root. Nov 27 19:22:30 np0005538338.novalocal sudo[92048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:22:30 np0005538338.novalocal sudo[92048]: pam_unix(sudo:session): session closed for user root Nov 27 19:22:30 np0005538338.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Nov 27 19:23:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:23:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:23:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:23:09 np0005538338.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Nov 27 19:23:16 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:23:16 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:23:17 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 95832400-d2ca-44b3-83f0-39b7733fc4d1 Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 23b4da8e-bcd9-408f-b91d-688cfe93a079 Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e46fcf44-0109-4f9b-bf2f-083d6ff1dc3c Nov 27 19:23:18 np0005538338.novalocal setroubleshoot[92086]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Nov 27 19:23:28 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Nov 27 19:23:28 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.312s CPU time. Nov 27 19:23:28 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:23:28 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.261s CPU time. Nov 27 19:23:29 np0005538338.novalocal sudo[92151]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:23:29 np0005538338.novalocal systemd[1]: Started Session c31 of User root. Nov 27 19:23:29 np0005538338.novalocal sudo[92151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:29 np0005538338.novalocal sudo[92151]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:29 np0005538338.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Nov 27 19:23:29 np0005538338.novalocal sudo[92155]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:23:29 np0005538338.novalocal systemd[1]: Started Session c32 of User root. Nov 27 19:23:29 np0005538338.novalocal sudo[92155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:29 np0005538338.novalocal sudo[92155]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:29 np0005538338.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Nov 27 19:23:29 np0005538338.novalocal sudo[92159]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:23:29 np0005538338.novalocal systemd[1]: Started Session c33 of User root. Nov 27 19:23:29 np0005538338.novalocal sudo[92159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:30 np0005538338.novalocal sudo[92159]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:30 np0005538338.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Nov 27 19:23:30 np0005538338.novalocal sudo[92163]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:23:30 np0005538338.novalocal systemd[1]: Started Session c34 of User root. Nov 27 19:23:30 np0005538338.novalocal sudo[92163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:30 np0005538338.novalocal sudo[92163]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:30 np0005538338.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Nov 27 19:23:54 np0005538338.novalocal sudo[92186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-a608a7a7-7281-4eb5-943e-8fc323afb398 cinder-volumes/cinder-volumes-pool Nov 27 19:23:54 np0005538338.novalocal systemd[1]: Started Session c35 of User root. Nov 27 19:23:54 np0005538338.novalocal sudo[92186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:54 np0005538338.novalocal dmeventd[89238]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Nov 27 19:23:55 np0005538338.novalocal dmeventd[89238]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Nov 27 19:23:55 np0005538338.novalocal lvm[92242]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:23:55 np0005538338.novalocal lvm[92242]: VG cinder-volumes finished Nov 27 19:23:55 np0005538338.novalocal sudo[92186]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:55 np0005538338.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Nov 27 19:23:57 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:23:57 np0005538338.novalocal sudo[92245]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpthos6ypo/privsep.sock Nov 27 19:23:57 np0005538338.novalocal systemd[1]: Started Session c36 of User root. Nov 27 19:23:57 np0005538338.novalocal sudo[92245]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:23:58 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:23:58 np0005538338.novalocal sudo[92245]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:58 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Nov 27 19:23:59 np0005538338.novalocal sudo[92272]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:23:59 np0005538338.novalocal systemd[1]: Started Session c37 of User root. Nov 27 19:23:59 np0005538338.novalocal sudo[92272]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:59 np0005538338.novalocal sudo[92272]: pam_unix(sudo:session): session closed for user root Nov 27 19:23:59 np0005538338.novalocal systemd[1]: session-c37.scope: Deactivated successfully. Nov 27 19:23:59 np0005538338.novalocal sudo[92278]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd False -p3260 -a::1 Nov 27 19:23:59 np0005538338.novalocal systemd[1]: Started Session c38 of User root. Nov 27 19:23:59 np0005538338.novalocal sudo[92278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:23:59 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:24:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. For complete SELinux messages run: sealert -l d0e55b08-1c82-4376-8d06-fd83c3e2d431 Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .cache directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:00 np0005538338.novalocal sudo[92278]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:00 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:00 np0005538338.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Nov 27 19:24:00 np0005538338.novalocal sudo[92298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:24:00 np0005538338.novalocal systemd[1]: Started Session c39 of User root. Nov 27 19:24:00 np0005538338.novalocal sudo[92298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:00 np0005538338.novalocal sudo[92298]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:00 np0005538338.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Nov 27 19:24:00 np0005538338.novalocal sudo[92303]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:00 np0005538338.novalocal systemd[1]: Started Session c40 of User root. Nov 27 19:24:00 np0005538338.novalocal sudo[92303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:01 np0005538338.novalocal sudo[92303]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:01 np0005538338.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Nov 27 19:24:01 np0005538338.novalocal sudo[92308]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:24:01 np0005538338.novalocal systemd[1]: Started Session c41 of User root. Nov 27 19:24:01 np0005538338.novalocal sudo[92308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:01 np0005538338.novalocal sudo[92308]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:01 np0005538338.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Nov 27 19:24:01 np0005538338.novalocal sudo[92313]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:02 np0005538338.novalocal systemd[1]: Started Session c42 of User root. Nov 27 19:24:02 np0005538338.novalocal sudo[92313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:02 np0005538338.novalocal sudo[92313]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:02 np0005538338.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Nov 27 19:24:02 np0005538338.novalocal kernel: iscsi: registered transport (tcp) Nov 27 19:24:02 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:24:02 np0005538338.novalocal iscsid[74253]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014057e78c408290f4a248caa2e87c port group 0 rel port 1 Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:24:02 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:24:02 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:24:02 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:02 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:24:02 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:03 np0005538338.novalocal sudo[92357]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:24:03 np0005538338.novalocal systemd[1]: Started Session c43 of User root. Nov 27 19:24:03 np0005538338.novalocal sudo[92357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:03 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:24:04 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:04 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:24:04 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:04 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:24:04 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:24:04 np0005538338.novalocal sudo[92357]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:04 np0005538338.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Nov 27 19:24:04 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:05 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:24:05 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:24:05 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:24:05 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:24:05 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:24:05 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:24:05 np0005538338.novalocal sudo[92364]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:05 np0005538338.novalocal systemd[1]: Started Session c44 of User root. Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:05 np0005538338.novalocal sudo[92364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:24:05 np0005538338.novalocal sudo[92364]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:05 np0005538338.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Nov 27 19:24:05 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:24:05 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:05 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:24:05 np0005538338.novalocal iscsid[74253]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:24:06 np0005538338.novalocal sudo[92403]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:24:06 np0005538338.novalocal systemd[1]: Started Session c45 of User root. Nov 27 19:24:06 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:24:06 np0005538338.novalocal sudo[92403]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:06 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:06 np0005538338.novalocal sudo[92403]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:06 np0005538338.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Nov 27 19:24:06 np0005538338.novalocal sudo[92409]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:06 np0005538338.novalocal systemd[1]: Started Session c46 of User root. Nov 27 19:24:06 np0005538338.novalocal sudo[92409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:07 np0005538338.novalocal sudo[92409]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:07 np0005538338.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Nov 27 19:24:07 np0005538338.novalocal sudo[92414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:24:07 np0005538338.novalocal systemd[1]: Started Session c47 of User root. Nov 27 19:24:07 np0005538338.novalocal sudo[92414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:07 np0005538338.novalocal sudo[92414]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:07 np0005538338.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Nov 27 19:24:07 np0005538338.novalocal sudo[92419]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:24:07 np0005538338.novalocal systemd[1]: Started Session c48 of User root. Nov 27 19:24:07 np0005538338.novalocal sudo[92419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:08 np0005538338.novalocal sudo[92419]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:08 np0005538338.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Nov 27 19:24:08 np0005538338.novalocal sudo[92424]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:08 np0005538338.novalocal systemd[1]: Started Session c49 of User root. Nov 27 19:24:08 np0005538338.novalocal sudo[92424]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:08 np0005538338.novalocal sudo[92424]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:08 np0005538338.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Nov 27 19:24:14 np0005538338.novalocal sudo[92432]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 cinder-volumes/cinder-volumes-pool Nov 27 19:24:14 np0005538338.novalocal systemd[1]: Started Session c50 of User root. Nov 27 19:24:14 np0005538338.novalocal sudo[92432]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:14 np0005538338.novalocal lvm[92443]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:24:14 np0005538338.novalocal lvm[92443]: VG cinder-volumes finished Nov 27 19:24:15 np0005538338.novalocal sudo[92432]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:15 np0005538338.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Nov 27 19:24:15 np0005538338.novalocal sudo[92445]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpi_yminj8/privsep.sock Nov 27 19:24:15 np0005538338.novalocal systemd[1]: Started Session c51 of User root. Nov 27 19:24:15 np0005538338.novalocal sudo[92445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. For complete SELinux messages run: sealert -l d0e55b08-1c82-4376-8d06-fd83c3e2d431 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .cache directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:16 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:16 np0005538338.novalocal sudo[92445]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:17 np0005538338.novalocal sudo[92463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 Nov 27 19:24:17 np0005538338.novalocal systemd[1]: Started Session c52 of User root. Nov 27 19:24:17 np0005538338.novalocal sudo[92463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:17 np0005538338.novalocal sudo[92463]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:17 np0005538338.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Nov 27 19:24:17 np0005538338.novalocal sudo[92467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 6RxUJfwKTXiHfGCQxY7m WtGwSN5YNCfxYgGp False -p3260 -a::1 Nov 27 19:24:17 np0005538338.novalocal systemd[1]: Started Session c53 of User root. Nov 27 19:24:17 np0005538338.novalocal sudo[92467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:18 np0005538338.novalocal sudo[92467]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:18 np0005538338.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Nov 27 19:24:18 np0005538338.novalocal sudo[92473]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:24:18 np0005538338.novalocal systemd[1]: Started Session c54 of User root. Nov 27 19:24:18 np0005538338.novalocal sudo[92473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:18 np0005538338.novalocal sudo[92473]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:18 np0005538338.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Nov 27 19:24:18 np0005538338.novalocal sudo[92478]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:18 np0005538338.novalocal systemd[1]: Started Session c55 of User root. Nov 27 19:24:18 np0005538338.novalocal sudo[92478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:19 np0005538338.novalocal sudo[92478]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:19 np0005538338.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Nov 27 19:24:19 np0005538338.novalocal sudo[92483]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 6RxUJfwKTXiHfGCQxY7m WtGwSN5YNCfxYgGp iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:24:19 np0005538338.novalocal systemd[1]: Started Session c56 of User root. Nov 27 19:24:19 np0005538338.novalocal sudo[92483]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:19 np0005538338.novalocal sudo[92483]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:19 np0005538338.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Nov 27 19:24:19 np0005538338.novalocal sudo[92488]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:19 np0005538338.novalocal systemd[1]: Started Session c57 of User root. Nov 27 19:24:19 np0005538338.novalocal sudo[92488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:20 np0005538338.novalocal sudo[92488]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:20 np0005538338.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Nov 27 19:24:20 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:24:20 np0005538338.novalocal iscsid[74253]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:24:20 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:24:20 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:24:20 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405c4f1ab05faa149f1bd709cc74 port group 0 rel port 1 Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:24:20 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:24:20 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:20 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:24:21 np0005538338.novalocal sudo[92533]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:24:21 np0005538338.novalocal systemd[1]: Started Session c58 of User root. Nov 27 19:24:21 np0005538338.novalocal sudo[92533]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:21 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:24:22 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:22 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:24:22 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:24:22 np0005538338.novalocal sudo[92533]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:22 np0005538338.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Nov 27 19:24:22 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:24:22 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:24:22 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:24:22 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:24:22 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:24:22 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:24:22 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:24:22 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:24:22 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:24:23 np0005538338.novalocal sudo[92540]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:24:23 np0005538338.novalocal systemd[1]: Started Session c59 of User root. Nov 27 19:24:23 np0005538338.novalocal sudo[92540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:24:23 np0005538338.novalocal sudo[92540]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:23 np0005538338.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:24:23 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:24:23 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:23 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:24:23 np0005538338.novalocal iscsid[74253]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:24:24 np0005538338.novalocal sudo[92571]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:24:24 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:24:24 np0005538338.novalocal systemd[1]: Started Session c60 of User root. Nov 27 19:24:24 np0005538338.novalocal sudo[92571]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:24 np0005538338.novalocal setroubleshoot[92247]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:24:24 np0005538338.novalocal sudo[92571]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:24 np0005538338.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Nov 27 19:24:24 np0005538338.novalocal sudo[92577]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:24 np0005538338.novalocal systemd[1]: Started Session c61 of User root. Nov 27 19:24:24 np0005538338.novalocal sudo[92577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:25 np0005538338.novalocal sudo[92577]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:25 np0005538338.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Nov 27 19:24:25 np0005538338.novalocal sudo[92582]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:24:25 np0005538338.novalocal systemd[1]: Started Session c62 of User root. Nov 27 19:24:25 np0005538338.novalocal sudo[92582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:25 np0005538338.novalocal sudo[92582]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:25 np0005538338.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Nov 27 19:24:25 np0005538338.novalocal sudo[92587]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-dc12cc55-7ade-45b9-b0fb-ac3338329290 Nov 27 19:24:25 np0005538338.novalocal systemd[1]: Started Session c63 of User root. Nov 27 19:24:25 np0005538338.novalocal sudo[92587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:26 np0005538338.novalocal sudo[92587]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:26 np0005538338.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Nov 27 19:24:26 np0005538338.novalocal sudo[92594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:24:26 np0005538338.novalocal systemd[1]: Started Session c64 of User root. Nov 27 19:24:26 np0005538338.novalocal sudo[92594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:26 np0005538338.novalocal sudo[92594]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:26 np0005538338.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Nov 27 19:24:29 np0005538338.novalocal sudo[92636]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:24:29 np0005538338.novalocal systemd[1]: Started Session c65 of User root. Nov 27 19:24:29 np0005538338.novalocal sudo[92636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:29 np0005538338.novalocal sudo[92636]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:29 np0005538338.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Nov 27 19:24:29 np0005538338.novalocal sudo[92641]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:24:29 np0005538338.novalocal systemd[1]: Started Session c66 of User root. Nov 27 19:24:29 np0005538338.novalocal sudo[92641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:29 np0005538338.novalocal sudo[92641]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:29 np0005538338.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Nov 27 19:24:30 np0005538338.novalocal sudo[92645]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:24:30 np0005538338.novalocal systemd[1]: Started Session c67 of User root. Nov 27 19:24:30 np0005538338.novalocal sudo[92645]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:30 np0005538338.novalocal sudo[92645]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:30 np0005538338.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Nov 27 19:24:30 np0005538338.novalocal sudo[92649]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:24:30 np0005538338.novalocal systemd[1]: Started Session c68 of User root. Nov 27 19:24:30 np0005538338.novalocal sudo[92649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:24:30 np0005538338.novalocal sudo[92649]: pam_unix(sudo:session): session closed for user root Nov 27 19:24:30 np0005538338.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Nov 27 19:24:34 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Nov 27 19:24:34 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.368s CPU time. Nov 27 19:24:34 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:24:34 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 3.373s CPU time. Nov 27 19:25:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:25:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:25:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:25:29 np0005538338.novalocal sudo[92731]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:25:29 np0005538338.novalocal systemd[1]: Started Session c69 of User root. Nov 27 19:25:29 np0005538338.novalocal sudo[92731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:25:29 np0005538338.novalocal sudo[92731]: pam_unix(sudo:session): session closed for user root Nov 27 19:25:29 np0005538338.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Nov 27 19:25:29 np0005538338.novalocal sudo[92736]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:25:29 np0005538338.novalocal systemd[1]: Started Session c70 of User root. Nov 27 19:25:29 np0005538338.novalocal sudo[92736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:25:29 np0005538338.novalocal sudo[92736]: pam_unix(sudo:session): session closed for user root Nov 27 19:25:29 np0005538338.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Nov 27 19:25:29 np0005538338.novalocal sudo[92740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:25:29 np0005538338.novalocal systemd[1]: Started Session c71 of User root. Nov 27 19:25:29 np0005538338.novalocal sudo[92740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:25:30 np0005538338.novalocal sudo[92740]: pam_unix(sudo:session): session closed for user root Nov 27 19:25:30 np0005538338.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Nov 27 19:25:30 np0005538338.novalocal sudo[92744]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:25:30 np0005538338.novalocal systemd[1]: Started Session c72 of User root. Nov 27 19:25:30 np0005538338.novalocal sudo[92744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:25:30 np0005538338.novalocal sudo[92744]: pam_unix(sudo:session): session closed for user root Nov 27 19:25:30 np0005538338.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Nov 27 19:26:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:26:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:26:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:26:29 np0005538338.novalocal sudo[92823]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:26:29 np0005538338.novalocal systemd[1]: Started Session c73 of User root. Nov 27 19:26:29 np0005538338.novalocal sudo[92823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:26:29 np0005538338.novalocal sudo[92823]: pam_unix(sudo:session): session closed for user root Nov 27 19:26:29 np0005538338.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Nov 27 19:26:29 np0005538338.novalocal sudo[92828]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:26:29 np0005538338.novalocal systemd[1]: Started Session c74 of User root. Nov 27 19:26:29 np0005538338.novalocal sudo[92828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:26:29 np0005538338.novalocal sudo[92828]: pam_unix(sudo:session): session closed for user root Nov 27 19:26:29 np0005538338.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Nov 27 19:26:29 np0005538338.novalocal sudo[92832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:26:29 np0005538338.novalocal systemd[1]: Started Session c75 of User root. Nov 27 19:26:29 np0005538338.novalocal sudo[92832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:26:30 np0005538338.novalocal sudo[92832]: pam_unix(sudo:session): session closed for user root Nov 27 19:26:30 np0005538338.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Nov 27 19:26:30 np0005538338.novalocal sudo[92836]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:26:30 np0005538338.novalocal systemd[1]: Started Session c76 of User root. Nov 27 19:26:30 np0005538338.novalocal sudo[92836]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:26:30 np0005538338.novalocal sudo[92836]: pam_unix(sudo:session): session closed for user root Nov 27 19:26:30 np0005538338.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Nov 27 19:26:42 np0005538338.novalocal systemd[88985]: Created slice User Background Tasks Slice. Nov 27 19:26:42 np0005538338.novalocal systemd[88985]: Starting Cleanup of User's Temporary Files and Directories... Nov 27 19:26:42 np0005538338.novalocal systemd[88985]: Finished Cleanup of User's Temporary Files and Directories. Nov 27 19:27:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:27:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:27:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:27:12 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:12 np0005538338.novalocal systemd-rc-local-generator[92895]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:12 np0005538338.novalocal systemd-sysv-generator[92898]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:12 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:12 np0005538338.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Nov 27 19:27:14 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:27:15 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:27:15 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Nov 27 19:27:16 np0005538338.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Nov 27 19:27:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:16 np0005538338.novalocal systemd-rc-local-generator[92953]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:16 np0005538338.novalocal systemd-sysv-generator[92958]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:16 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:16 np0005538338.novalocal systemd-rc-local-generator[92986]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:17 np0005538338.novalocal systemd-sysv-generator[92989]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l b6aff61b-0984-4f13-a3c5-0e64d082f1dc Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l c102b9e2-4efd-4a95-a733-fe7ff387ebc5 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 533aaa80-384c-4e63-8eff-2dae6511164f Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 2233ec34-740f-44c0-a887-e8d5de3e2d16 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 66844038-a93f-4844-ba9a-f49f8cd4e548 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 55119661-9e07-4893-917f-e98eb3388b54 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 950f85cb-3bee-4135-8fbd-1eb45eb09699 Nov 27 19:27:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 02a5a21d-5d49-4c0e-b2ca-10f0462b31a8 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal systemd-rc-local-generator[93026]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:17 np0005538338.novalocal systemd-sysv-generator[93031]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l e1861f78-612a-4b08-ae2a-76ef732719ac Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 9cc01bf3-4531-4401-a629-c2101b91dff9 Nov 27 19:27:17 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:18 np0005538338.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Nov 27 19:27:22 np0005538338.novalocal systemd[1]: Started OpenStack Nova Compute Server. Nov 27 19:27:22 np0005538338.novalocal systemd[1]: Starting libvirt QEMU daemon... Nov 27 19:27:22 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:22 np0005538338.novalocal systemd-rc-local-generator[93105]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:22 np0005538338.novalocal systemd-sysv-generator[93111]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:22 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:23 np0005538338.novalocal systemd[1]: Started libvirt QEMU daemon. Nov 27 19:27:23 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:23 np0005538338.novalocal systemd-rc-local-generator[93149]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:23 np0005538338.novalocal systemd-sysv-generator[93154]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:23 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:23 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:24 np0005538338.novalocal systemd-rc-local-generator[93195]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:24 np0005538338.novalocal systemd-sysv-generator[93198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:24 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:24 np0005538338.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Nov 27 19:27:24 np0005538338.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Nov 27 19:27:24 np0005538338.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Nov 27 19:27:24 np0005538338.novalocal systemd[1]: Starting libvirt nodedev daemon... Nov 27 19:27:24 np0005538338.novalocal systemd[1]: Started libvirt nodedev daemon. Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l b6aff61b-0984-4f13-a3c5-0e64d082f1dc Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l c102b9e2-4efd-4a95-a733-fe7ff387ebc5 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 533aaa80-384c-4e63-8eff-2dae6511164f Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 2233ec34-740f-44c0-a887-e8d5de3e2d16 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 66844038-a93f-4844-ba9a-f49f8cd4e548 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 55119661-9e07-4893-917f-e98eb3388b54 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 950f85cb-3bee-4135-8fbd-1eb45eb09699 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 02a5a21d-5d49-4c0e-b2ca-10f0462b31a8 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l e1861f78-612a-4b08-ae2a-76ef732719ac Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 9cc01bf3-4531-4401-a629-c2101b91dff9 Nov 27 19:27:26 np0005538338.novalocal setroubleshoot[92906]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Nov 27 19:27:26 np0005538338.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Nov 27 19:27:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:27 np0005538338.novalocal systemd-rc-local-generator[93267]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:27 np0005538338.novalocal systemd-sysv-generator[93270]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:27 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:27 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:27:27 np0005538338.novalocal systemd-rc-local-generator[93331]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:27:27 np0005538338.novalocal systemd-sysv-generator[93334]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:27:27 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:27:29 np0005538338.novalocal sudo[93344]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:27:29 np0005538338.novalocal systemd[1]: Started Session c77 of User root. Nov 27 19:27:29 np0005538338.novalocal sudo[93344]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:27:29 np0005538338.novalocal sudo[93344]: pam_unix(sudo:session): session closed for user root Nov 27 19:27:29 np0005538338.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Nov 27 19:27:29 np0005538338.novalocal sudo[93348]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:27:29 np0005538338.novalocal systemd[1]: Started Session c78 of User root. Nov 27 19:27:29 np0005538338.novalocal sudo[93348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:27:30 np0005538338.novalocal sudo[93348]: pam_unix(sudo:session): session closed for user root Nov 27 19:27:30 np0005538338.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Nov 27 19:27:30 np0005538338.novalocal sudo[93352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:27:30 np0005538338.novalocal systemd[1]: Started Session c79 of User root. Nov 27 19:27:30 np0005538338.novalocal sudo[93352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:27:30 np0005538338.novalocal sudo[93352]: pam_unix(sudo:session): session closed for user root Nov 27 19:27:30 np0005538338.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Nov 27 19:27:30 np0005538338.novalocal sudo[93356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:27:30 np0005538338.novalocal systemd[1]: Started Session c80 of User root. Nov 27 19:27:30 np0005538338.novalocal sudo[93356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:27:30 np0005538338.novalocal sudo[93356]: pam_unix(sudo:session): session closed for user root Nov 27 19:27:30 np0005538338.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Nov 27 19:27:36 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Nov 27 19:27:36 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.411s CPU time. Nov 27 19:27:36 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:27:36 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 2.304s CPU time. Nov 27 19:28:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:28:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:28:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:28:03 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:28:03 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:28:04 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l e5ece4db-0d31-4917-a3e3-ec693b146a35 Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 17d7b041-5e23-4555-8d21-6807b7ba218e Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 19316952-a313-4c77-8fb0-64544d50408b Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a': Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l bce0fcb2-dba5-4359-8b91-2b865739536a Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 4c2182a8-c527-4076-ba51-344926d249f1 Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 0be647d7-4476-4c75-8545-888faace8033 Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from read access on the file b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 3f6a9592-cbf6-424b-a94b-77a90993cebd Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from read access on the file b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l cfecab96-71c1-4f65-84f3-b5cc46c53002 Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 4c2182a8-c527-4076-ba51-344926d249f1 Nov 27 19:28:05 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:06 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 0be647d7-4476-4c75-8545-888faace8033 Nov 27 19:28:06 np0005538338.novalocal setroubleshoot[93375]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:28:16 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:28:16 np0005538338.novalocal systemd-sysv-generator[93431]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:28:16 np0005538338.novalocal systemd-rc-local-generator[93427]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.240s CPU time. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.623s CPU time. Nov 27 19:28:16 np0005538338.novalocal systemd[1]: Started OpenStack Octavia Worker service. Nov 27 19:28:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:28:17 np0005538338.novalocal systemd-rc-local-generator[93460]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:28:17 np0005538338.novalocal systemd-sysv-generator[93466]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:28:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:28:17 np0005538338.novalocal systemd[1]: Reloading. Nov 27 19:28:17 np0005538338.novalocal systemd-rc-local-generator[93494]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 27 19:28:17 np0005538338.novalocal systemd-sysv-generator[93498]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 27 19:28:17 np0005538338.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Nov 27 19:28:29 np0005538338.novalocal sudo[93581]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:28:29 np0005538338.novalocal systemd[1]: Started Session c81 of User root. Nov 27 19:28:29 np0005538338.novalocal sudo[93581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:28:29 np0005538338.novalocal sudo[93581]: pam_unix(sudo:session): session closed for user root Nov 27 19:28:29 np0005538338.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Nov 27 19:28:29 np0005538338.novalocal sudo[93585]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:28:29 np0005538338.novalocal systemd[1]: Started Session c82 of User root. Nov 27 19:28:29 np0005538338.novalocal sudo[93585]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:28:29 np0005538338.novalocal sudo[93585]: pam_unix(sudo:session): session closed for user root Nov 27 19:28:29 np0005538338.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Nov 27 19:28:29 np0005538338.novalocal sudo[93593]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:28:29 np0005538338.novalocal systemd[1]: Started Session c83 of User root. Nov 27 19:28:29 np0005538338.novalocal sudo[93593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:28:30 np0005538338.novalocal sudo[93593]: pam_unix(sudo:session): session closed for user root Nov 27 19:28:30 np0005538338.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Nov 27 19:28:30 np0005538338.novalocal sudo[93598]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:28:30 np0005538338.novalocal systemd[1]: Started Session c84 of User root. Nov 27 19:28:30 np0005538338.novalocal sudo[93598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:28:30 np0005538338.novalocal sudo[93598]: pam_unix(sudo:session): session closed for user root Nov 27 19:28:30 np0005538338.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Nov 27 19:28:34 np0005538338.novalocal runuser[93738]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:28:35 np0005538338.novalocal runuser[93738]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:28:35 np0005538338.novalocal runuser[93791]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:28:36 np0005538338.novalocal runuser[93791]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:28:36 np0005538338.novalocal runuser[93847]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:28:37 np0005538338.novalocal runuser[93847]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:29:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:29:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:29:07 np0005538338.novalocal sshd-session[94203]: Connection closed by 40.124.173.157 port 53496 Nov 27 19:29:07 np0005538338.novalocal sshd-session[94232]: banner exchange: Connection from 40.124.173.157 port 55676: invalid format Nov 27 19:29:22 np0005538338.novalocal crontab[94289]: (root) LIST (root) Nov 27 19:29:22 np0005538338.novalocal crontab[94290]: (root) LIST (keystone) Nov 27 19:29:22 np0005538338.novalocal crontab[94291]: (root) LIST (cinder) Nov 27 19:29:22 np0005538338.novalocal crontab[94292]: (root) LIST (glance) Nov 27 19:29:22 np0005538338.novalocal crontab[94293]: (root) LIST (nova) Nov 27 19:29:22 np0005538338.novalocal crontab[94294]: (root) LIST (manila) Nov 27 19:29:26 np0005538338.novalocal runuser[94305]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:27 np0005538338.novalocal runuser[94305]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:27 np0005538338.novalocal runuser[94362]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:28 np0005538338.novalocal runuser[94362]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:28 np0005538338.novalocal runuser[94450]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:28 np0005538338.novalocal runuser[94450]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:29 np0005538338.novalocal runuser[94505]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:29 np0005538338.novalocal sudo[94517]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:29:29 np0005538338.novalocal systemd[1]: Started Session c85 of User root. Nov 27 19:29:29 np0005538338.novalocal sudo[94517]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:29:29 np0005538338.novalocal sudo[94517]: pam_unix(sudo:session): session closed for user root Nov 27 19:29:29 np0005538338.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Nov 27 19:29:29 np0005538338.novalocal sudo[94554]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:29:29 np0005538338.novalocal systemd[1]: Started Session c86 of User root. Nov 27 19:29:29 np0005538338.novalocal sudo[94554]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:29:29 np0005538338.novalocal runuser[94505]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:29 np0005538338.novalocal runuser[94564]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:29 np0005538338.novalocal sudo[94554]: pam_unix(sudo:session): session closed for user root Nov 27 19:29:29 np0005538338.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Nov 27 19:29:30 np0005538338.novalocal sudo[94610]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:29:30 np0005538338.novalocal systemd[1]: Started Session c87 of User root. Nov 27 19:29:30 np0005538338.novalocal sudo[94610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:29:30 np0005538338.novalocal sudo[94610]: pam_unix(sudo:session): session closed for user root Nov 27 19:29:30 np0005538338.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Nov 27 19:29:30 np0005538338.novalocal runuser[94564]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:30 np0005538338.novalocal sudo[94621]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:29:30 np0005538338.novalocal systemd[1]: Started Session c88 of User root. Nov 27 19:29:30 np0005538338.novalocal sudo[94621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:29:30 np0005538338.novalocal runuser[94622]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:30 np0005538338.novalocal sudo[94621]: pam_unix(sudo:session): session closed for user root Nov 27 19:29:30 np0005538338.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Nov 27 19:29:31 np0005538338.novalocal runuser[94622]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:31 np0005538338.novalocal runuser[94679]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:31 np0005538338.novalocal runuser[94679]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:32 np0005538338.novalocal runuser[94731]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:32 np0005538338.novalocal runuser[94731]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:32 np0005538338.novalocal runuser[94783]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:33 np0005538338.novalocal runuser[94783]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:34 np0005538338.novalocal runuser[94845]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:35 np0005538338.novalocal runuser[94845]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:35 np0005538338.novalocal runuser[94897]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:35 np0005538338.novalocal runuser[94897]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:36 np0005538338.novalocal runuser[94951]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:36 np0005538338.novalocal runuser[94951]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:36 np0005538338.novalocal runuser[95005]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:37 np0005538338.novalocal runuser[95005]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:37 np0005538338.novalocal runuser[95062]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:38 np0005538338.novalocal runuser[95062]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:38 np0005538338.novalocal runuser[95114]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:39 np0005538338.novalocal runuser[95114]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:41 np0005538338.novalocal virtqemud[93072]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Nov 27 19:29:41 np0005538338.novalocal virtqemud[93072]: hostname: np0005538338.novalocal Nov 27 19:29:41 np0005538338.novalocal virtqemud[93072]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Nov 27 19:29:41 np0005538338.novalocal virtqemud[93072]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Nov 27 19:29:42 np0005538338.novalocal runuser[95194]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:42 np0005538338.novalocal runuser[95194]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:42 np0005538338.novalocal runuser[95246]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:43 np0005538338.novalocal runuser[95246]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:44 np0005538338.novalocal runuser[95306]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:44 np0005538338.novalocal runuser[95306]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:29:45 np0005538338.novalocal runuser[95358]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Nov 27 19:29:45 np0005538338.novalocal runuser[95358]: pam_unix(runuser:session): session closed for user rabbitmq Nov 27 19:30:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:30:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:30:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:30:01 np0005538338.novalocal systemd[1]: Created slice User Slice of UID 163. Nov 27 19:30:01 np0005538338.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Nov 27 19:30:01 np0005538338.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Nov 27 19:30:02 np0005538338.novalocal systemd[1]: Starting User Manager for UID 163... Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Queued start job for default target Main User Target. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Created slice User Application Slice. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Started Daily Cleanup of User's Temporary Directories. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Reached target Paths. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Reached target Timers. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Starting D-Bus User Message Bus Socket... Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Listening on PipeWire PulseAudio. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Listening on PipeWire Multimedia System Sockets. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Starting Create User's Volatile Files and Directories... Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Finished Create User's Volatile Files and Directories. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Listening on D-Bus User Message Bus Socket. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Reached target Sockets. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Reached target Basic System. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Reached target Main User Target. Nov 27 19:30:02 np0005538338.novalocal systemd[95437]: Startup finished in 226ms. Nov 27 19:30:02 np0005538338.novalocal systemd[1]: Started User Manager for UID 163. Nov 27 19:30:02 np0005538338.novalocal systemd[1]: Started Session 5 of User keystone. Nov 27 19:30:02 np0005538338.novalocal CROND[95448]: (keystone) CMD (keystone-manage fernet_rotate) Nov 27 19:30:03 np0005538338.novalocal CROND[95434]: (keystone) CMDEND (keystone-manage fernet_rotate) Nov 27 19:30:03 np0005538338.novalocal systemd[1]: session-5.scope: Deactivated successfully. Nov 27 19:30:03 np0005538338.novalocal systemd[1]: session-5.scope: Consumed 1.502s CPU time. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: Stopping User Manager for UID 163... Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Activating special unit Exit the Session... Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped target Main User Target. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped target Basic System. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped target Paths. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped target Sockets. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped target Timers. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped Daily Cleanup of User's Temporary Directories. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Closed D-Bus User Message Bus Socket. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Closed PipeWire PulseAudio. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Closed PipeWire Multimedia System Sockets. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Stopped Create User's Volatile Files and Directories. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Removed slice User Application Slice. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Reached target Shutdown. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Finished Exit the Session. Nov 27 19:30:13 np0005538338.novalocal systemd[95437]: Reached target Exit the Session. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: user@163.service: Deactivated successfully. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: Stopped User Manager for UID 163. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Nov 27 19:30:13 np0005538338.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: Removed slice User Slice of UID 163. Nov 27 19:30:13 np0005538338.novalocal systemd[1]: user-163.slice: Consumed 1.797s CPU time. Nov 27 19:30:29 np0005538338.novalocal sudo[95505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:30:29 np0005538338.novalocal systemd[1]: Started Session c89 of User root. Nov 27 19:30:29 np0005538338.novalocal sudo[95505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:30:29 np0005538338.novalocal sudo[95505]: pam_unix(sudo:session): session closed for user root Nov 27 19:30:29 np0005538338.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Nov 27 19:30:29 np0005538338.novalocal sudo[95509]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:30:29 np0005538338.novalocal systemd[1]: Started Session c90 of User root. Nov 27 19:30:29 np0005538338.novalocal sudo[95509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:30:29 np0005538338.novalocal sudo[95509]: pam_unix(sudo:session): session closed for user root Nov 27 19:30:29 np0005538338.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Nov 27 19:30:29 np0005538338.novalocal sudo[95513]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:30:30 np0005538338.novalocal systemd[1]: Started Session c91 of User root. Nov 27 19:30:30 np0005538338.novalocal sudo[95513]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:30:30 np0005538338.novalocal sudo[95513]: pam_unix(sudo:session): session closed for user root Nov 27 19:30:30 np0005538338.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Nov 27 19:30:30 np0005538338.novalocal sudo[95517]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:30:30 np0005538338.novalocal systemd[1]: Started Session c92 of User root. Nov 27 19:30:30 np0005538338.novalocal sudo[95517]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:30:30 np0005538338.novalocal sudo[95517]: pam_unix(sudo:session): session closed for user root Nov 27 19:30:30 np0005538338.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Nov 27 19:31:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:31:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:31:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:31:29 np0005538338.novalocal sudo[95597]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:31:29 np0005538338.novalocal systemd[1]: Started Session c93 of User root. Nov 27 19:31:29 np0005538338.novalocal sudo[95597]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:31:29 np0005538338.novalocal sudo[95597]: pam_unix(sudo:session): session closed for user root Nov 27 19:31:29 np0005538338.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Nov 27 19:31:29 np0005538338.novalocal sudo[95601]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:31:29 np0005538338.novalocal systemd[1]: Started Session c94 of User root. Nov 27 19:31:29 np0005538338.novalocal sudo[95601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:31:29 np0005538338.novalocal sudo[95601]: pam_unix(sudo:session): session closed for user root Nov 27 19:31:29 np0005538338.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Nov 27 19:31:29 np0005538338.novalocal sudo[95605]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:31:29 np0005538338.novalocal systemd[1]: Started Session c95 of User root. Nov 27 19:31:29 np0005538338.novalocal sudo[95605]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:31:30 np0005538338.novalocal sudo[95605]: pam_unix(sudo:session): session closed for user root Nov 27 19:31:30 np0005538338.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Nov 27 19:31:30 np0005538338.novalocal sudo[95609]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:31:30 np0005538338.novalocal systemd[1]: Started Session c96 of User root. Nov 27 19:31:30 np0005538338.novalocal sudo[95609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:31:30 np0005538338.novalocal sudo[95609]: pam_unix(sudo:session): session closed for user root Nov 27 19:31:30 np0005538338.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Nov 27 19:32:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:32:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:32:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:32:20 np0005538338.novalocal sshd-session[95652]: Received disconnect from 193.46.255.33 port 12030:11: [preauth] Nov 27 19:32:20 np0005538338.novalocal sshd-session[95652]: Disconnected from authenticating user root 193.46.255.33 port 12030 [preauth] Nov 27 19:32:29 np0005538338.novalocal sudo[95712]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:32:29 np0005538338.novalocal systemd[1]: Started Session c97 of User root. Nov 27 19:32:29 np0005538338.novalocal sudo[95712]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:29 np0005538338.novalocal sudo[95712]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:29 np0005538338.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Nov 27 19:32:29 np0005538338.novalocal sudo[95716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:32:29 np0005538338.novalocal systemd[1]: Started Session c98 of User root. Nov 27 19:32:29 np0005538338.novalocal sudo[95716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:29 np0005538338.novalocal sudo[95716]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:29 np0005538338.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Nov 27 19:32:29 np0005538338.novalocal sudo[95720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:32:29 np0005538338.novalocal systemd[1]: Started Session c99 of User root. Nov 27 19:32:29 np0005538338.novalocal sudo[95720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:30 np0005538338.novalocal sudo[95720]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:30 np0005538338.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Nov 27 19:32:30 np0005538338.novalocal sudo[95725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:32:30 np0005538338.novalocal systemd[1]: Started Session c100 of User root. Nov 27 19:32:30 np0005538338.novalocal sudo[95725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:30 np0005538338.novalocal sudo[95725]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:30 np0005538338.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Nov 27 19:32:46 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:32:47 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:32:47 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Nov 27 19:32:49 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 04343350-b134-4862-be8c-693079a2fb4d Nov 27 19:32:49 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Nov 27 19:32:51 np0005538338.novalocal sudo[95783]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:32:51 np0005538338.novalocal systemd[1]: Started Session c101 of User root. Nov 27 19:32:51 np0005538338.novalocal sudo[95783]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:51 np0005538338.novalocal sudo[95783]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:51 np0005538338.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Nov 27 19:32:51 np0005538338.novalocal sudo[95788]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd False -p3260 -a::1 Nov 27 19:32:51 np0005538338.novalocal systemd[1]: Started Session c102 of User root. Nov 27 19:32:51 np0005538338.novalocal sudo[95788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:52 np0005538338.novalocal sudo[95788]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:52 np0005538338.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Nov 27 19:32:52 np0005538338.novalocal sudo[95794]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:32:52 np0005538338.novalocal systemd[1]: Started Session c103 of User root. Nov 27 19:32:52 np0005538338.novalocal sudo[95794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:53 np0005538338.novalocal sudo[95794]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:53 np0005538338.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Nov 27 19:32:53 np0005538338.novalocal sudo[95801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:32:53 np0005538338.novalocal systemd[1]: Started Session c104 of User root. Nov 27 19:32:53 np0005538338.novalocal sudo[95801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:53 np0005538338.novalocal sudo[95801]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:53 np0005538338.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Nov 27 19:32:53 np0005538338.novalocal sudo[95806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:32:53 np0005538338.novalocal systemd[1]: Started Session c105 of User root. Nov 27 19:32:53 np0005538338.novalocal sudo[95806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:54 np0005538338.novalocal sudo[95806]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:54 np0005538338.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Nov 27 19:32:54 np0005538338.novalocal sudo[95811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:32:54 np0005538338.novalocal systemd[1]: Started Session c106 of User root. Nov 27 19:32:54 np0005538338.novalocal sudo[95811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:54 np0005538338.novalocal sudo[95811]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:54 np0005538338.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Nov 27 19:32:55 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:32:55 np0005538338.novalocal iscsid[74253]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:32:55 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:32:55 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:32:55 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014059cdcf3868d064dd896441dd0c port group 0 rel port 1 Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:32:55 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:32:55 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:32:55 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:32:55 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:32:55 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:32:55 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:32:55 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:32:55 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:32:55 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:32:55 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:32:56 np0005538338.novalocal sudo[95860]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:32:56 np0005538338.novalocal systemd[1]: Started Session c107 of User root. Nov 27 19:32:56 np0005538338.novalocal sudo[95860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:32:56 np0005538338.novalocal sudo[95860]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:56 np0005538338.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:32:56 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:32:57 np0005538338.novalocal sudo[95871]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:32:57 np0005538338.novalocal systemd[1]: Started Session c108 of User root. Nov 27 19:32:57 np0005538338.novalocal sudo[95871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:32:57 np0005538338.novalocal sudo[95871]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:57 np0005538338.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Nov 27 19:32:57 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:32:57 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal iscsid[74253]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:57 np0005538338.novalocal sudo[95906]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:32:57 np0005538338.novalocal systemd[1]: Started Session c109 of User root. Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:32:57 np0005538338.novalocal sudo[95906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:57 np0005538338.novalocal setroubleshoot[95748]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:32:58 np0005538338.novalocal sudo[95906]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:58 np0005538338.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Nov 27 19:32:58 np0005538338.novalocal sudo[95912]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:32:58 np0005538338.novalocal systemd[1]: Started Session c110 of User root. Nov 27 19:32:58 np0005538338.novalocal sudo[95912]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:58 np0005538338.novalocal sudo[95912]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:58 np0005538338.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Nov 27 19:32:58 np0005538338.novalocal sudo[95918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:32:58 np0005538338.novalocal systemd[1]: Started Session c111 of User root. Nov 27 19:32:58 np0005538338.novalocal sudo[95918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:32:59 np0005538338.novalocal sudo[95918]: pam_unix(sudo:session): session closed for user root Nov 27 19:32:59 np0005538338.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Nov 27 19:32:59 np0005538338.novalocal sudo[95923]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:32:59 np0005538338.novalocal systemd[1]: Started Session c112 of User root. Nov 27 19:32:59 np0005538338.novalocal sudo[95923]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:00 np0005538338.novalocal sudo[95923]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:00 np0005538338.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Nov 27 19:33:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:33:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:33:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:33:00 np0005538338.novalocal sudo[95929]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:33:00 np0005538338.novalocal systemd[1]: Started Session c113 of User root. Nov 27 19:33:00 np0005538338.novalocal sudo[95929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:00 np0005538338.novalocal sudo[95929]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:00 np0005538338.novalocal systemd[1]: session-c113.scope: Deactivated successfully. Nov 27 19:33:00 np0005538338.novalocal sudo[95938]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp5mzq2lt_/privsep.sock Nov 27 19:33:00 np0005538338.novalocal systemd[1]: Started Session c114 of User root. Nov 27 19:33:00 np0005538338.novalocal sudo[95938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Nov 27 19:33:01 np0005538338.novalocal sudo[95938]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:02 np0005538338.novalocal sudo[95959]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmppbb8gekx/privsep.sock Nov 27 19:33:02 np0005538338.novalocal systemd[1]: Started Session c115 of User root. Nov 27 19:33:02 np0005538338.novalocal sudo[95959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Nov 27 19:33:03 np0005538338.novalocal sudo[95959]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:03 np0005538338.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Nov 27 19:33:03 np0005538338.novalocal kernel: tapd93c6b27-1b: entered promiscuous mode Nov 27 19:33:03 np0005538338.novalocal NetworkManager[858]: [1764289983.6985] manager: (tapd93c6b27-1b): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Nov 27 19:33:03 np0005538338.novalocal virtqemud[93072]: Domain id=1 name='instance-00000001' uuid=5fec66b0-60c2-4f14-ae75-8594328c40e5 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:33:03 np0005538338.novalocal virtqemud[93072]: Domain id=1 name='instance-00000001' uuid=5fec66b0-60c2-4f14-ae75-8594328c40e5 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:33:03 np0005538338.novalocal systemd-machined[90535]: New machine qemu-1-instance-00000001. Nov 27 19:33:03 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Nov 27 19:33:03 np0005538338.novalocal sudo[95981]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpfpgjl2zq/privsep.sock Nov 27 19:33:03 np0005538338.novalocal systemd-udevd[95988]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:03 np0005538338.novalocal systemd[1]: Started Session c116 of User root. Nov 27 19:33:03 np0005538338.novalocal NetworkManager[858]: [1764289983.7930] device (tapd93c6b27-1b): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:33:03 np0005538338.novalocal NetworkManager[858]: [1764289983.7937] device (tapd93c6b27-1b): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:33:03 np0005538338.novalocal sudo[95981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:04 np0005538338.novalocal sudo[95981]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:05 np0005538338.novalocal sudo[96012]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmppzx_kyhf/privsep.sock Nov 27 19:33:05 np0005538338.novalocal systemd[1]: Started Session c117 of User root. Nov 27 19:33:05 np0005538338.novalocal sudo[96012]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:06 np0005538338.novalocal sudo[96012]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:07 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Nov 27 19:33:07 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.375s CPU time. Nov 27 19:33:07 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:33:07 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 2.025s CPU time. Nov 27 19:33:08 np0005538338.novalocal NetworkManager[858]: [1764289988.0381] manager: (tapb441aa09-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Nov 27 19:33:08 np0005538338.novalocal systemd-udevd[96033]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:08 np0005538338.novalocal NetworkManager[858]: [1764289988.0928] device (tapb441aa09-f0): carrier: link connected Nov 27 19:33:08 np0005538338.novalocal kernel: tapb441aa09-f0: entered promiscuous mode Nov 27 19:33:08 np0005538338.novalocal sudo[96061]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b441aa09-f60a-46f8-b774-6ce86792056e env PROCESS_TAG=haproxy-b441aa09-f60a-46f8-b774-6ce86792056e haproxy -f /var/lib/neutron/ovn-metadata-proxy/b441aa09-f60a-46f8-b774-6ce86792056e.conf Nov 27 19:33:08 np0005538338.novalocal systemd[1]: Started Session c118 of User root. Nov 27 19:33:08 np0005538338.novalocal sudo[96061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:08 np0005538338.novalocal sudo[96061]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:10 np0005538338.novalocal kernel: tapd93c6b27-1b (unregistering): left promiscuous mode Nov 27 19:33:10 np0005538338.novalocal NetworkManager[858]: [1764289990.2452] device (tapd93c6b27-1b): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:33:10 np0005538338.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Nov 27 19:33:10 np0005538338.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Nov 27 19:33:10 np0005538338.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 6.070s CPU time. Nov 27 19:33:10 np0005538338.novalocal kernel: tapb441aa09-f0: left promiscuous mode Nov 27 19:33:10 np0005538338.novalocal systemd-machined[90535]: Machine qemu-1-instance-00000001 terminated. Nov 27 19:33:10 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2db441aa09\x2df60a\x2d46f8\x2db774\x2d6ce86792056e.mount: Deactivated successfully. Nov 27 19:33:12 np0005538338.novalocal kernel: tapbe4728dc-d6: entered promiscuous mode Nov 27 19:33:12 np0005538338.novalocal NetworkManager[858]: [1764289992.6911] manager: (tapbe4728dc-d6): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Nov 27 19:33:12 np0005538338.novalocal virtqemud[93072]: Domain id=2 name='instance-00000002' uuid=01b972a9-ea98-4674-b4f4-7e40182f1025 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:33:12 np0005538338.novalocal virtqemud[93072]: Domain id=2 name='instance-00000002' uuid=01b972a9-ea98-4674-b4f4-7e40182f1025 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:33:12 np0005538338.novalocal systemd-machined[90535]: New machine qemu-2-instance-00000002. Nov 27 19:33:12 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Nov 27 19:33:12 np0005538338.novalocal systemd-udevd[96144]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:12 np0005538338.novalocal NetworkManager[858]: [1764289992.8233] device (tapbe4728dc-d6): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:33:12 np0005538338.novalocal NetworkManager[858]: [1764289992.8241] device (tapbe4728dc-d6): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:33:12 np0005538338.novalocal NetworkManager[858]: [1764289992.8439] manager: (tapd7cd3cc8-60): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Nov 27 19:33:12 np0005538338.novalocal NetworkManager[858]: [1764289992.9169] device (tapd7cd3cc8-60): carrier: link connected Nov 27 19:33:13 np0005538338.novalocal kernel: tapd7cd3cc8-60: entered promiscuous mode Nov 27 19:33:13 np0005538338.novalocal sudo[96186]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-d7cd3cc8-6f7e-456e-92eb-2cbd13971585 env PROCESS_TAG=haproxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585 haproxy -f /var/lib/neutron/ovn-metadata-proxy/d7cd3cc8-6f7e-456e-92eb-2cbd13971585.conf Nov 27 19:33:13 np0005538338.novalocal systemd[1]: Started Session c119 of User root. Nov 27 19:33:13 np0005538338.novalocal sudo[96186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:13 np0005538338.novalocal sudo[96186]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:23 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:33:24 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:33:24 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Nov 27 19:33:25 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from read access on the file b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 3f6a9592-cbf6-424b-a94b-77a90993cebd Nov 27 19:33:25 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from read access on the file b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a': Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l cfecab96-71c1-4f65-84f3-b5cc46c53002 Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 4c2182a8-c527-4076-ba51-344926d249f1 Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. For complete SELinux messages run: sealert -l 0be647d7-4476-4c75-8545-888faace8033 Nov 27 19:33:26 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35878 [27/Nov/2025:19:33:22.638] listener listener/metadata 0/0/0/3492/3492 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:33:26 np0005538338.novalocal setroubleshoot[96236]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the b8ae63699502fdee851cef7cc349298950ea76b377b2cb7f965761f36b22d44a file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:33:29 np0005538338.novalocal sudo[96303]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:33:29 np0005538338.novalocal systemd[1]: Started Session c120 of User root. Nov 27 19:33:29 np0005538338.novalocal sudo[96303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:29 np0005538338.novalocal sudo[96303]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:29 np0005538338.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Nov 27 19:33:29 np0005538338.novalocal sudo[96307]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:33:29 np0005538338.novalocal systemd[1]: Started Session c121 of User root. Nov 27 19:33:29 np0005538338.novalocal sudo[96307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:29 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35880 [27/Nov/2025:19:33:26.231] listener listener/metadata 0/0/0/3512/3512 200 147 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Nov 27 19:33:29 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35882 [27/Nov/2025:19:33:29.816] listener listener/metadata 0/0/0/21/21 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Nov 27 19:33:29 np0005538338.novalocal sudo[96307]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:29 np0005538338.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Nov 27 19:33:29 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35884 [27/Nov/2025:19:33:29.898] listener listener/metadata 0/0/0/20/20 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:33:29 np0005538338.novalocal sudo[96311]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:33:29 np0005538338.novalocal systemd[1]: Started Session c122 of User root. Nov 27 19:33:29 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35886 [27/Nov/2025:19:33:29.969] listener listener/metadata 0/0/0/20/20 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal sudo[96311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35888 [27/Nov/2025:19:33:30.038] listener listener/metadata 0/0/0/18/18 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35890 [27/Nov/2025:19:33:30.116] listener listener/metadata 0/0/0/23/23 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35892 [27/Nov/2025:19:33:30.192] listener listener/metadata 0/0/0/24/24 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35894 [27/Nov/2025:19:33:30.266] listener listener/metadata 0/0/0/17/17 200 185 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35896 [27/Nov/2025:19:33:30.332] listener listener/metadata 0/0/0/19/19 200 185 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal sudo[96311]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:30 np0005538338.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35898 [27/Nov/2025:19:33:30.404] listener listener/metadata 0/0/0/19/19 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal sudo[96316]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:33:30 np0005538338.novalocal systemd[1]: Started Session c123 of User root. Nov 27 19:33:30 np0005538338.novalocal sudo[96316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35900 [27/Nov/2025:19:33:30.480] listener listener/metadata 0/0/0/15/15 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35902 [27/Nov/2025:19:33:30.535] listener listener/metadata 0/0/0/11/11 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35904 [27/Nov/2025:19:33:30.587] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35906 [27/Nov/2025:19:33:30.650] listener listener/metadata 0/0/0/31/31 200 185 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal haproxy-metadata-proxy-d7cd3cc8-6f7e-456e-92eb-2cbd13971585[96191]: 10.100.0.14:35908 [27/Nov/2025:19:33:30.743] listener listener/metadata 0/0/0/15/15 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Nov 27 19:33:30 np0005538338.novalocal sudo[96316]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:30 np0005538338.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Nov 27 19:33:36 np0005538338.novalocal kernel: tapae496c0b-3f: entered promiscuous mode Nov 27 19:33:36 np0005538338.novalocal NetworkManager[858]: [1764290016.1021] manager: (tapae496c0b-3f): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Nov 27 19:33:36 np0005538338.novalocal virtqemud[93072]: Domain id=3 name='instance-00000003' uuid=0b667858-8768-4320-b4a1-73f7401fdd39 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:33:36 np0005538338.novalocal virtqemud[93072]: Domain id=3 name='instance-00000003' uuid=0b667858-8768-4320-b4a1-73f7401fdd39 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:33:36 np0005538338.novalocal systemd-machined[90535]: New machine qemu-3-instance-00000003. Nov 27 19:33:36 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Nov 27 19:33:36 np0005538338.novalocal systemd-udevd[96392]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:36 np0005538338.novalocal NetworkManager[858]: [1764290016.2052] manager: (tapebb7d5d8-80): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Nov 27 19:33:36 np0005538338.novalocal systemd-udevd[96396]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:36 np0005538338.novalocal NetworkManager[858]: [1764290016.2148] device (tapae496c0b-3f): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:33:36 np0005538338.novalocal NetworkManager[858]: [1764290016.2153] device (tapae496c0b-3f): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:33:36 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Nov 27 19:33:36 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.244s CPU time. Nov 27 19:33:36 np0005538338.novalocal NetworkManager[858]: [1764290016.2683] device (tapebb7d5d8-80): carrier: link connected Nov 27 19:33:36 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:33:36 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.392s CPU time. Nov 27 19:33:36 np0005538338.novalocal kernel: tapebb7d5d8-80: entered promiscuous mode Nov 27 19:33:36 np0005538338.novalocal sudo[96434]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-ebb7d5d8-872b-47af-9546-7a2983a8a3d0 env PROCESS_TAG=haproxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0 haproxy -f /var/lib/neutron/ovn-metadata-proxy/ebb7d5d8-872b-47af-9546-7a2983a8a3d0.conf Nov 27 19:33:36 np0005538338.novalocal systemd[1]: Started Session c124 of User root. Nov 27 19:33:36 np0005538338.novalocal sudo[96434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:36 np0005538338.novalocal sudo[96434]: pam_unix(sudo:session): session closed for user root Nov 27 19:33:46 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37372 [27/Nov/2025:19:33:46.374] listener listener/metadata 0/0/0/89/89 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:33:46 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37374 [27/Nov/2025:19:33:46.526] listener listener/metadata 0/0/0/153/153 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Nov 27 19:33:46 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37376 [27/Nov/2025:19:33:46.722] listener listener/metadata 0/0/0/11/11 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Nov 27 19:33:46 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37378 [27/Nov/2025:19:33:46.826] listener listener/metadata 0/0/0/19/19 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:33:46 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37380 [27/Nov/2025:19:33:46.931] listener listener/metadata 0/0/0/16/16 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37382 [27/Nov/2025:19:33:47.007] listener listener/metadata 0/0/0/15/15 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37384 [27/Nov/2025:19:33:47.071] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37386 [27/Nov/2025:19:33:47.121] listener listener/metadata 0/0/0/15/15 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37388 [27/Nov/2025:19:33:47.172] listener listener/metadata 0/0/0/13/13 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37390 [27/Nov/2025:19:33:47.226] listener listener/metadata 0/0/0/16/16 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37392 [27/Nov/2025:19:33:47.281] listener listener/metadata 0/0/0/13/13 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37394 [27/Nov/2025:19:33:47.332] listener listener/metadata 0/0/0/9/9 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37396 [27/Nov/2025:19:33:47.398] listener listener/metadata 0/0/0/11/11 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37398 [27/Nov/2025:19:33:47.449] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37400 [27/Nov/2025:19:33:47.504] listener listener/metadata 0/0/0/15/15 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Nov 27 19:33:47 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96441]: 10.100.0.4:37402 [27/Nov/2025:19:33:47.584] listener listener/metadata 0/0/0/17/17 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Nov 27 19:33:54 np0005538338.novalocal kernel: tapbe4728dc-d6 (unregistering): left promiscuous mode Nov 27 19:33:54 np0005538338.novalocal NetworkManager[858]: [1764290034.3648] device (tapbe4728dc-d6): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:33:54 np0005538338.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Nov 27 19:33:54 np0005538338.novalocal kernel: tapd7cd3cc8-60: left promiscuous mode Nov 27 19:33:54 np0005538338.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Nov 27 19:33:54 np0005538338.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 14.827s CPU time. Nov 27 19:33:54 np0005538338.novalocal systemd-machined[90535]: Machine qemu-2-instance-00000002 terminated. Nov 27 19:33:54 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2dd7cd3cc8\x2d6f7e\x2d456e\x2d92eb\x2d2cbd13971585.mount: Deactivated successfully. Nov 27 19:33:55 np0005538338.novalocal kernel: tapae496c0b-3f (unregistering): left promiscuous mode Nov 27 19:33:55 np0005538338.novalocal NetworkManager[858]: [1764290035.7852] device (tapae496c0b-3f): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:33:55 np0005538338.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Nov 27 19:33:55 np0005538338.novalocal kernel: tapebb7d5d8-80: left promiscuous mode Nov 27 19:33:55 np0005538338.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Nov 27 19:33:55 np0005538338.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 16.479s CPU time. Nov 27 19:33:55 np0005538338.novalocal systemd-machined[90535]: Machine qemu-3-instance-00000003 terminated. Nov 27 19:33:55 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2debb7d5d8\x2d872b\x2d47af\x2d9546\x2d7a2983a8a3d0.mount: Deactivated successfully. Nov 27 19:33:56 np0005538338.novalocal kernel: tapae496c0b-3f: entered promiscuous mode Nov 27 19:33:56 np0005538338.novalocal systemd-udevd[96485]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:33:56 np0005538338.novalocal NetworkManager[858]: [1764290036.6090] manager: (tapae496c0b-3f): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Nov 27 19:33:56 np0005538338.novalocal virtqemud[93072]: Domain id=4 name='instance-00000003' uuid=0b667858-8768-4320-b4a1-73f7401fdd39 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:33:56 np0005538338.novalocal virtqemud[93072]: Domain id=4 name='instance-00000003' uuid=0b667858-8768-4320-b4a1-73f7401fdd39 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:33:56 np0005538338.novalocal NetworkManager[858]: [1764290036.6245] device (tapae496c0b-3f): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:33:56 np0005538338.novalocal NetworkManager[858]: [1764290036.6252] device (tapae496c0b-3f): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:33:56 np0005538338.novalocal systemd-machined[90535]: New machine qemu-4-instance-00000003. Nov 27 19:33:56 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000003. Nov 27 19:33:56 np0005538338.novalocal NetworkManager[858]: [1764290036.7175] manager: (tapebb7d5d8-80): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Nov 27 19:33:56 np0005538338.novalocal NetworkManager[858]: [1764290036.7902] device (tapebb7d5d8-80): carrier: link connected Nov 27 19:33:56 np0005538338.novalocal kernel: tapebb7d5d8-80: entered promiscuous mode Nov 27 19:33:57 np0005538338.novalocal sudo[96613]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-ebb7d5d8-872b-47af-9546-7a2983a8a3d0 env PROCESS_TAG=haproxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0 haproxy -f /var/lib/neutron/ovn-metadata-proxy/ebb7d5d8-872b-47af-9546-7a2983a8a3d0.conf Nov 27 19:33:57 np0005538338.novalocal systemd[1]: Started Session c125 of User root. Nov 27 19:33:57 np0005538338.novalocal sudo[96613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:33:57 np0005538338.novalocal sudo[96613]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:03 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34760 [27/Nov/2025:19:34:03.597] listener listener/metadata 0/0/0/144/144 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:34:03 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34762 [27/Nov/2025:19:34:03.830] listener listener/metadata 0/0/0/137/137 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34764 [27/Nov/2025:19:34:04.006] listener listener/metadata 0/0/0/17/17 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34766 [27/Nov/2025:19:34:04.060] listener listener/metadata 0/0/0/14/14 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34768 [27/Nov/2025:19:34:04.112] listener listener/metadata 0/0/0/17/17 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34770 [27/Nov/2025:19:34:04.211] listener listener/metadata 0/0/0/16/16 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34772 [27/Nov/2025:19:34:04.287] listener listener/metadata 0/0/0/16/16 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34774 [27/Nov/2025:19:34:04.347] listener listener/metadata 0/0/0/14/14 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34776 [27/Nov/2025:19:34:04.404] listener listener/metadata 0/0/0/16/16 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34778 [27/Nov/2025:19:34:04.465] listener listener/metadata 0/0/0/17/17 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34780 [27/Nov/2025:19:34:04.518] listener listener/metadata 0/0/0/18/18 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34782 [27/Nov/2025:19:34:04.572] listener listener/metadata 0/0/0/15/15 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34784 [27/Nov/2025:19:34:04.613] listener listener/metadata 0/0/0/15/15 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34786 [27/Nov/2025:19:34:04.653] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34788 [27/Nov/2025:19:34:04.705] listener listener/metadata 0/0/0/14/14 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Nov 27 19:34:04 np0005538338.novalocal haproxy-metadata-proxy-ebb7d5d8-872b-47af-9546-7a2983a8a3d0[96618]: 10.100.0.4:34790 [27/Nov/2025:19:34:04.761] listener listener/metadata 0/0/0/17/17 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Nov 27 19:34:06 np0005538338.novalocal kernel: tapae496c0b-3f (unregistering): left promiscuous mode Nov 27 19:34:06 np0005538338.novalocal NetworkManager[858]: [1764290046.2478] device (tapae496c0b-3f): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:34:06 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:34:06 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:34:06 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:34:06 np0005538338.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000003.scope: Deactivated successfully. Nov 27 19:34:06 np0005538338.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000003.scope: Consumed 9.215s CPU time. Nov 27 19:34:06 np0005538338.novalocal systemd-machined[90535]: Machine qemu-4-instance-00000003 terminated. Nov 27 19:34:06 np0005538338.novalocal kernel: tapebb7d5d8-80: left promiscuous mode Nov 27 19:34:06 np0005538338.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Nov 27 19:34:06 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2debb7d5d8\x2d872b\x2d47af\x2d9546\x2d7a2983a8a3d0.mount: Deactivated successfully. Nov 27 19:34:09 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:34:09 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:34:10 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Nov 27 19:34:11 np0005538338.novalocal setroubleshoot[96671]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 04343350-b134-4862-be8c-693079a2fb4d Nov 27 19:34:11 np0005538338.novalocal setroubleshoot[96671]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Nov 27 19:34:18 np0005538338.novalocal sudo[96694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:34:18 np0005538338.novalocal systemd[1]: Started Session c126 of User root. Nov 27 19:34:18 np0005538338.novalocal sudo[96694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:18 np0005538338.novalocal sudo[96694]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:18 np0005538338.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Nov 27 19:34:18 np0005538338.novalocal sudo[96698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd False -p3260 -a::1 Nov 27 19:34:18 np0005538338.novalocal systemd[1]: Started Session c127 of User root. Nov 27 19:34:19 np0005538338.novalocal sudo[96698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:19 np0005538338.novalocal sudo[96698]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:19 np0005538338.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Nov 27 19:34:19 np0005538338.novalocal sudo[96704]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:19 np0005538338.novalocal systemd[1]: Started Session c128 of User root. Nov 27 19:34:19 np0005538338.novalocal sudo[96704]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:20 np0005538338.novalocal sudo[96704]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:20 np0005538338.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Nov 27 19:34:20 np0005538338.novalocal sudo[96709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:20 np0005538338.novalocal systemd[1]: Started Session c129 of User root. Nov 27 19:34:20 np0005538338.novalocal sudo[96709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:20 np0005538338.novalocal sudo[96709]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:20 np0005538338.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Nov 27 19:34:20 np0005538338.novalocal sudo[96714]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:34:20 np0005538338.novalocal systemd[1]: Started Session c130 of User root. Nov 27 19:34:20 np0005538338.novalocal sudo[96714]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:20 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Nov 27 19:34:20 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.210s CPU time. Nov 27 19:34:21 np0005538338.novalocal sudo[96714]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:21 np0005538338.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Nov 27 19:34:21 np0005538338.novalocal sudo[96720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:21 np0005538338.novalocal systemd[1]: Started Session c131 of User root. Nov 27 19:34:21 np0005538338.novalocal sudo[96720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:21 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:34:21 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.301s CPU time. Nov 27 19:34:21 np0005538338.novalocal sudo[96720]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:21 np0005538338.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Nov 27 19:34:22 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:34:22 np0005538338.novalocal iscsid[74253]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:34:22 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:34:22 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:34:22 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014050aedbb4a0995435a9fe4c6682 port group 0 rel port 1 Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:34:22 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:34:22 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:34:22 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:34:22 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:34:22 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:22 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:34:22 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:22 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:34:22 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:34:22 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:34:22 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:34:23 np0005538338.novalocal sudo[96769]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:34:23 np0005538338.novalocal systemd[1]: Started Session c132 of User root. Nov 27 19:34:23 np0005538338.novalocal sudo[96769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:34:23 np0005538338.novalocal setroubleshoot[96758]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Nov 27 19:34:23 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Nov 27 19:34:23 np0005538338.novalocal sudo[96769]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:23 np0005538338.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Nov 27 19:34:24 np0005538338.novalocal sudo[96803]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:34:24 np0005538338.novalocal systemd[1]: Started Session c133 of User root. Nov 27 19:34:24 np0005538338.novalocal sudo[96803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:34:24 np0005538338.novalocal sudo[96803]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:24 np0005538338.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:34:24 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:34:24 np0005538338.novalocal iscsid[74253]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:34:24 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:34:25 np0005538338.novalocal sudo[96841]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:34:25 np0005538338.novalocal systemd[1]: Started Session c134 of User root. Nov 27 19:34:25 np0005538338.novalocal sudo[96841]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:34:25 np0005538338.novalocal setroubleshoot[96758]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:34:25 np0005538338.novalocal sudo[96841]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:25 np0005538338.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Nov 27 19:34:25 np0005538338.novalocal sudo[96849]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:25 np0005538338.novalocal systemd[1]: Started Session c135 of User root. Nov 27 19:34:25 np0005538338.novalocal sudo[96849]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:26 np0005538338.novalocal sudo[96849]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:26 np0005538338.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Nov 27 19:34:26 np0005538338.novalocal sudo[96854]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:26 np0005538338.novalocal systemd[1]: Started Session c136 of User root. Nov 27 19:34:26 np0005538338.novalocal sudo[96854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:26 np0005538338.novalocal sudo[96854]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:26 np0005538338.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Nov 27 19:34:26 np0005538338.novalocal sudo[96859]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:34:26 np0005538338.novalocal systemd[1]: Started Session c137 of User root. Nov 27 19:34:26 np0005538338.novalocal sudo[96859]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:27 np0005538338.novalocal sudo[96859]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:27 np0005538338.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Nov 27 19:34:27 np0005538338.novalocal sudo[96866]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:27 np0005538338.novalocal systemd[1]: Started Session c138 of User root. Nov 27 19:34:27 np0005538338.novalocal sudo[96866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:27 np0005538338.novalocal sudo[96866]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:27 np0005538338.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Nov 27 19:34:28 np0005538338.novalocal sudo[96871]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf privsep-helper --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf --privsep_context cinder.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpfs6quajr/privsep.sock Nov 27 19:34:28 np0005538338.novalocal systemd[1]: Started Session c139 of User root. Nov 27 19:34:28 np0005538338.novalocal sudo[96871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:28 np0005538338.novalocal sudo[96871]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:28 np0005538338.novalocal sudo[96881]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:28 np0005538338.novalocal systemd[1]: Started Session c140 of User root. Nov 27 19:34:28 np0005538338.novalocal sudo[96881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:29 np0005538338.novalocal sudo[96916]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:34:29 np0005538338.novalocal systemd[1]: Started Session c141 of User root. Nov 27 19:34:29 np0005538338.novalocal sudo[96916]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:29 np0005538338.novalocal sudo[96881]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:29 np0005538338.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Nov 27 19:34:29 np0005538338.novalocal sudo[96921]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:29 np0005538338.novalocal systemd[1]: Started Session c142 of User root. Nov 27 19:34:29 np0005538338.novalocal sudo[96921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:29 np0005538338.novalocal sudo[96916]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:29 np0005538338.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Nov 27 19:34:29 np0005538338.novalocal sudo[96925]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:34:29 np0005538338.novalocal systemd[1]: Started Session c143 of User root. Nov 27 19:34:29 np0005538338.novalocal sudo[96925]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:29 np0005538338.novalocal sudo[96921]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:29 np0005538338.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Nov 27 19:34:29 np0005538338.novalocal sudo[96931]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:29 np0005538338.novalocal sudo[96925]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:29 np0005538338.novalocal systemd[1]: Started Session c144 of User root. Nov 27 19:34:29 np0005538338.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Nov 27 19:34:29 np0005538338.novalocal sudo[96931]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:29 np0005538338.novalocal sudo[96934]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:34:29 np0005538338.novalocal systemd[1]: Started Session c145 of User root. Nov 27 19:34:29 np0005538338.novalocal sudo[96934]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:30 np0005538338.novalocal sudo[96931]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:30 np0005538338.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Nov 27 19:34:30 np0005538338.novalocal sudo[96934]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:30 np0005538338.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Nov 27 19:34:30 np0005538338.novalocal sudo[96941]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:30 np0005538338.novalocal sudo[96942]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:34:30 np0005538338.novalocal systemd[1]: Started Session c146 of User root. Nov 27 19:34:30 np0005538338.novalocal sudo[96941]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:30 np0005538338.novalocal systemd[1]: Started Session c147 of User root. Nov 27 19:34:30 np0005538338.novalocal sudo[96942]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:30 np0005538338.novalocal sudo[96941]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:30 np0005538338.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Nov 27 19:34:30 np0005538338.novalocal sudo[96951]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 cinder-volumes/cinder-volumes-pool Nov 27 19:34:30 np0005538338.novalocal systemd[1]: Started Session c148 of User root. Nov 27 19:34:30 np0005538338.novalocal sudo[96951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:30 np0005538338.novalocal sudo[96942]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:30 np0005538338.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Nov 27 19:34:31 np0005538338.novalocal lvm[96962]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:34:31 np0005538338.novalocal lvm[96962]: VG cinder-volumes finished Nov 27 19:34:31 np0005538338.novalocal sudo[96951]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:31 np0005538338.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Nov 27 19:34:31 np0005538338.novalocal sudo[96963]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_download_bda24785-0687-4c19-b374-25e68e099e3d_d0qn_6da Nov 27 19:34:31 np0005538338.novalocal systemd[1]: Started Session c149 of User root. Nov 27 19:34:31 np0005538338.novalocal sudo[96963]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:31 np0005538338.novalocal sudo[96963]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:31 np0005538338.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Nov 27 19:34:31 np0005538338.novalocal sudo[96968]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_download_bda24785-0687-4c19-b374-25e68e099e3d_d0qn_6da Nov 27 19:34:31 np0005538338.novalocal systemd[1]: Started Session c150 of User root. Nov 27 19:34:31 np0005538338.novalocal sudo[96968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:32 np0005538338.novalocal sudo[96968]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:32 np0005538338.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Nov 27 19:34:32 np0005538338.novalocal sudo[96973]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:32 np0005538338.novalocal systemd[1]: Started Session c151 of User root. Nov 27 19:34:32 np0005538338.novalocal sudo[96973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:32 np0005538338.novalocal sudo[96973]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:32 np0005538338.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Nov 27 19:34:32 np0005538338.novalocal sudo[96978]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:32 np0005538338.novalocal systemd[1]: Started Session c152 of User root. Nov 27 19:34:32 np0005538338.novalocal sudo[96978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:32 np0005538338.novalocal sudo[96978]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:32 np0005538338.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Nov 27 19:34:32 np0005538338.novalocal sudo[96984]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf dd count=0 if=/var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 of=/dev/mapper/cinder--volumes-volume--22c60c9f--ac70--40aa--bef2--270d723c21f0 oflag=direct Nov 27 19:34:32 np0005538338.novalocal systemd[1]: Started Session c153 of User root. Nov 27 19:34:32 np0005538338.novalocal sudo[96984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:33 np0005538338.novalocal sudo[96984]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:33 np0005538338.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Nov 27 19:34:33 np0005538338.novalocal sudo[96989]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf qemu-img convert -O raw -t none -f raw /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 /dev/mapper/cinder--volumes-volume--22c60c9f--ac70--40aa--bef2--270d723c21f0 Nov 27 19:34:33 np0005538338.novalocal systemd[1]: Started Session c154 of User root. Nov 27 19:34:33 np0005538338.novalocal sudo[96989]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:34 np0005538338.novalocal sudo[96989]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:34 np0005538338.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Nov 27 19:34:34 np0005538338.novalocal sudo[97006]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:34 np0005538338.novalocal systemd[1]: Started Session c155 of User root. Nov 27 19:34:34 np0005538338.novalocal sudo[97006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:34 np0005538338.novalocal sudo[97006]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:34 np0005538338.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Nov 27 19:34:34 np0005538338.novalocal sudo[97011]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_4g5vxbklnp0005538338.novalocal@BACKEND_1 Nov 27 19:34:34 np0005538338.novalocal systemd[1]: Started Session c156 of User root. Nov 27 19:34:34 np0005538338.novalocal sudo[97011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:35 np0005538338.novalocal sudo[97011]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:35 np0005538338.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Nov 27 19:34:35 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Nov 27 19:34:35 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.259s CPU time. Nov 27 19:34:35 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:34:35 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 2.151s CPU time. Nov 27 19:34:36 np0005538338.novalocal sudo[97023]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmprcgrwuyu/privsep.sock Nov 27 19:34:37 np0005538338.novalocal systemd[1]: Started Session c157 of User root. Nov 27 19:34:37 np0005538338.novalocal sudo[97023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Nov 27 19:34:37 np0005538338.novalocal sudo[97023]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:38 np0005538338.novalocal sudo[97037]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 Nov 27 19:34:38 np0005538338.novalocal systemd[1]: Started Session c158 of User root. Nov 27 19:34:38 np0005538338.novalocal sudo[97037]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:38 np0005538338.novalocal sudo[97037]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:38 np0005538338.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Nov 27 19:34:38 np0005538338.novalocal sudo[97041]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 5mr7uRZVQ3A54B9Ut8Kh 5xFrAfueSqCB5b7h False -p3260 -a::1 Nov 27 19:34:38 np0005538338.novalocal systemd[1]: Started Session c159 of User root. Nov 27 19:34:38 np0005538338.novalocal sudo[97041]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:39 np0005538338.novalocal sudo[97041]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:39 np0005538338.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Nov 27 19:34:39 np0005538338.novalocal sudo[97047]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:39 np0005538338.novalocal systemd[1]: Started Session c160 of User root. Nov 27 19:34:39 np0005538338.novalocal sudo[97047]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:39 np0005538338.novalocal sudo[97047]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:39 np0005538338.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Nov 27 19:34:39 np0005538338.novalocal sudo[97052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:39 np0005538338.novalocal systemd[1]: Started Session c161 of User root. Nov 27 19:34:39 np0005538338.novalocal sudo[97052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:40 np0005538338.novalocal sudo[97052]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:40 np0005538338.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Nov 27 19:34:40 np0005538338.novalocal sudo[97057]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 5mr7uRZVQ3A54B9Ut8Kh 5xFrAfueSqCB5b7h iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:34:40 np0005538338.novalocal systemd[1]: Started Session c162 of User root. Nov 27 19:34:40 np0005538338.novalocal sudo[97057]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:40 np0005538338.novalocal sudo[97057]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:40 np0005538338.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Nov 27 19:34:40 np0005538338.novalocal sudo[97062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:40 np0005538338.novalocal systemd[1]: Started Session c163 of User root. Nov 27 19:34:40 np0005538338.novalocal sudo[97062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:41 np0005538338.novalocal sudo[97062]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:41 np0005538338.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Nov 27 19:34:41 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:34:41 np0005538338.novalocal iscsid[74253]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:34:41 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:34:41 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:34:41 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014052971868afadf4e64a56675dcf port group 0 rel port 1 Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:34:41 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:34:41 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:34:41 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:34:41 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:41 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:34:41 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:41 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:34:41 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:34:41 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:34:42 np0005538338.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Nov 27 19:34:42 np0005538338.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Nov 27 19:34:42 np0005538338.novalocal systemd[1]: Starting libvirt secret daemon... Nov 27 19:34:42 np0005538338.novalocal systemd[1]: Started libvirt secret daemon. Nov 27 19:34:43 np0005538338.novalocal kernel: tap7d7308cc-3a: entered promiscuous mode Nov 27 19:34:43 np0005538338.novalocal NetworkManager[858]: [1764290083.1264] manager: (tap7d7308cc-3a): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Nov 27 19:34:43 np0005538338.novalocal systemd-udevd[97092]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:34:43 np0005538338.novalocal virtqemud[93072]: Domain id=5 name='instance-00000004' uuid=a015b24f-757f-4b07-b54c-dead26761339 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:34:43 np0005538338.novalocal virtqemud[93072]: Domain id=5 name='instance-00000004' uuid=a015b24f-757f-4b07-b54c-dead26761339 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:34:43 np0005538338.novalocal NetworkManager[858]: [1764290083.1501] device (tap7d7308cc-3a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:34:43 np0005538338.novalocal NetworkManager[858]: [1764290083.1513] device (tap7d7308cc-3a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:34:43 np0005538338.novalocal systemd-machined[90535]: New machine qemu-5-instance-00000004. Nov 27 19:34:43 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000004. Nov 27 19:34:43 np0005538338.novalocal NetworkManager[858]: [1764290083.2555] manager: (tap2f235800-90): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Nov 27 19:34:43 np0005538338.novalocal NetworkManager[858]: [1764290083.3198] device (tap2f235800-90): carrier: link connected Nov 27 19:34:43 np0005538338.novalocal kernel: tap2f235800-90: entered promiscuous mode Nov 27 19:34:43 np0005538338.novalocal sudo[97181]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2f235800-9815-47f9-be05-78091edeb68f env PROCESS_TAG=haproxy-2f235800-9815-47f9-be05-78091edeb68f haproxy -f /var/lib/neutron/ovn-metadata-proxy/2f235800-9815-47f9-be05-78091edeb68f.conf Nov 27 19:34:43 np0005538338.novalocal systemd[1]: Started Session c164 of User root. Nov 27 19:34:43 np0005538338.novalocal sudo[97181]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:34:43 np0005538338.novalocal sudo[97181]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:47 np0005538338.novalocal kernel: tap7d7308cc-3a (unregistering): left promiscuous mode Nov 27 19:34:47 np0005538338.novalocal NetworkManager[858]: [1764290087.3397] device (tap7d7308cc-3a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:34:47 np0005538338.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Nov 27 19:34:47 np0005538338.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000004.scope: Deactivated successfully. Nov 27 19:34:47 np0005538338.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000004.scope: Consumed 3.951s CPU time. Nov 27 19:34:47 np0005538338.novalocal systemd-machined[90535]: Machine qemu-5-instance-00000004 terminated. Nov 27 19:34:47 np0005538338.novalocal kernel: tap2f235800-90: left promiscuous mode Nov 27 19:34:47 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d2f235800\x2d9815\x2d47f9\x2dbe05\x2d78091edeb68f.mount: Deactivated successfully. Nov 27 19:34:47 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:34:47 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:34:47 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:47 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:34:47 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:34:47 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:34:47 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:34:47 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:34:47 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:34:47 np0005538338.novalocal iscsid[74253]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:34:48 np0005538338.novalocal sudo[97267]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:34:48 np0005538338.novalocal systemd[1]: Started Session c165 of User root. Nov 27 19:34:48 np0005538338.novalocal sudo[97267]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:49 np0005538338.novalocal sudo[97267]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:49 np0005538338.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Nov 27 19:34:49 np0005538338.novalocal sudo[97273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:49 np0005538338.novalocal systemd[1]: Started Session c166 of User root. Nov 27 19:34:49 np0005538338.novalocal sudo[97273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:49 np0005538338.novalocal sudo[97273]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:49 np0005538338.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Nov 27 19:34:49 np0005538338.novalocal sudo[97278]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:49 np0005538338.novalocal systemd[1]: Started Session c167 of User root. Nov 27 19:34:49 np0005538338.novalocal sudo[97278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:50 np0005538338.novalocal sudo[97278]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:50 np0005538338.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Nov 27 19:34:50 np0005538338.novalocal sudo[97283]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 Nov 27 19:34:50 np0005538338.novalocal systemd[1]: Started Session c168 of User root. Nov 27 19:34:50 np0005538338.novalocal sudo[97283]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:50 np0005538338.novalocal sudo[97283]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:50 np0005538338.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Nov 27 19:34:50 np0005538338.novalocal sudo[97288]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:50 np0005538338.novalocal systemd[1]: Started Session c169 of User root. Nov 27 19:34:50 np0005538338.novalocal sudo[97288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:51 np0005538338.novalocal sudo[97288]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:51 np0005538338.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Nov 27 19:34:51 np0005538338.novalocal sudo[97293]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:51 np0005538338.novalocal systemd[1]: Started Session c170 of User root. Nov 27 19:34:51 np0005538338.novalocal sudo[97293]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:52 np0005538338.novalocal sudo[97293]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:52 np0005538338.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Nov 27 19:34:52 np0005538338.novalocal sudo[97298]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 Nov 27 19:34:52 np0005538338.novalocal systemd[1]: Started Session c171 of User root. Nov 27 19:34:52 np0005538338.novalocal sudo[97298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:52 np0005538338.novalocal sudo[97298]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:52 np0005538338.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Nov 27 19:34:52 np0005538338.novalocal sudo[97302]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 Nov 27 19:34:52 np0005538338.novalocal systemd[1]: Started Session c172 of User root. Nov 27 19:34:52 np0005538338.novalocal sudo[97302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:52 np0005538338.novalocal sudo[97302]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:52 np0005538338.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Nov 27 19:34:52 np0005538338.novalocal sudo[97306]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-22c60c9f-ac70-40aa-bef2-270d723c21f0 Nov 27 19:34:53 np0005538338.novalocal systemd[1]: Started Session c173 of User root. Nov 27 19:34:53 np0005538338.novalocal sudo[97306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:53 np0005538338.novalocal lvm[97313]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:34:53 np0005538338.novalocal lvm[97313]: VG cinder-volumes finished Nov 27 19:34:53 np0005538338.novalocal sudo[97306]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:53 np0005538338.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Nov 27 19:34:53 np0005538338.novalocal sudo[97314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:34:53 np0005538338.novalocal systemd[1]: Started Session c174 of User root. Nov 27 19:34:53 np0005538338.novalocal sudo[97314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:53 np0005538338.novalocal sudo[97314]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:53 np0005538338.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Nov 27 19:34:53 np0005538338.novalocal sudo[97318]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:34:53 np0005538338.novalocal systemd[1]: Started Session c175 of User root. Nov 27 19:34:53 np0005538338.novalocal sudo[97318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:54 np0005538338.novalocal sudo[97318]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:54 np0005538338.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Nov 27 19:34:54 np0005538338.novalocal sudo[97322]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:34:54 np0005538338.novalocal systemd[1]: Started Session c176 of User root. Nov 27 19:34:54 np0005538338.novalocal sudo[97322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:54 np0005538338.novalocal sudo[97322]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:54 np0005538338.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Nov 27 19:34:54 np0005538338.novalocal sudo[97326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:34:54 np0005538338.novalocal systemd[1]: Started Session c177 of User root. Nov 27 19:34:54 np0005538338.novalocal sudo[97326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:55 np0005538338.novalocal sudo[97326]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:55 np0005538338.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Nov 27 19:34:56 np0005538338.novalocal sudo[97330]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-5566efe7-58d1-4908-be43-0ff60743351d cinder-volumes/cinder-volumes-pool Nov 27 19:34:56 np0005538338.novalocal systemd[1]: Started Session c178 of User root. Nov 27 19:34:56 np0005538338.novalocal sudo[97330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:57 np0005538338.novalocal lvm[97343]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:34:57 np0005538338.novalocal lvm[97343]: VG cinder-volumes finished Nov 27 19:34:57 np0005538338.novalocal sudo[97330]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:57 np0005538338.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Nov 27 19:34:58 np0005538338.novalocal sudo[97351]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:34:58 np0005538338.novalocal systemd[1]: Started Session c179 of User root. Nov 27 19:34:58 np0005538338.novalocal sudo[97351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:58 np0005538338.novalocal sudo[97351]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:58 np0005538338.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Nov 27 19:34:58 np0005538338.novalocal sudo[97355]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d ZmYTa6W2jaF5BSxKwegB 9DUth6UHP5UZ6ZCf False -p3260 -a::1 Nov 27 19:34:58 np0005538338.novalocal systemd[1]: Started Session c180 of User root. Nov 27 19:34:58 np0005538338.novalocal sudo[97355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:59 np0005538338.novalocal sudo[97355]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:59 np0005538338.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Nov 27 19:34:59 np0005538338.novalocal sudo[97362]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:34:59 np0005538338.novalocal systemd[1]: Started Session c181 of User root. Nov 27 19:34:59 np0005538338.novalocal sudo[97362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:34:59 np0005538338.novalocal sudo[97362]: pam_unix(sudo:session): session closed for user root Nov 27 19:34:59 np0005538338.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Nov 27 19:34:59 np0005538338.novalocal sudo[97368]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:34:59 np0005538338.novalocal systemd[1]: Started Session c182 of User root. Nov 27 19:34:59 np0005538338.novalocal sudo[97368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:00 np0005538338.novalocal sudo[97368]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:00 np0005538338.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Nov 27 19:35:00 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:35:00 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:35:00 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:35:00 np0005538338.novalocal sudo[97374]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d ZmYTa6W2jaF5BSxKwegB 9DUth6UHP5UZ6ZCf iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:35:00 np0005538338.novalocal systemd[1]: Started Session c183 of User root. Nov 27 19:35:00 np0005538338.novalocal sudo[97374]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:00 np0005538338.novalocal sudo[97374]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:00 np0005538338.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Nov 27 19:35:00 np0005538338.novalocal sudo[97379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:00 np0005538338.novalocal systemd[1]: Started Session c184 of User root. Nov 27 19:35:00 np0005538338.novalocal sudo[97379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:01 np0005538338.novalocal sudo[97379]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:01 np0005538338.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Nov 27 19:35:01 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:35:01 np0005538338.novalocal iscsid[74253]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:35:01 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:35:01 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:35:01 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405b9f02eee371d41baac119c130 port group 0 rel port 1 Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:35:01 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:35:01 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:35:01 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:35:01 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:35:02 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:35:02 np0005538338.novalocal sudo[97430]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:35:02 np0005538338.novalocal systemd[1]: Started Session c185 of User root. Nov 27 19:35:02 np0005538338.novalocal sudo[97430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:35:02 np0005538338.novalocal setroubleshoot[97419]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Nov 27 19:35:02 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service. Nov 27 19:35:02 np0005538338.novalocal sudo[97430]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:02 np0005538338.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Nov 27 19:35:02 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:35:02 np0005538338.novalocal sudo[97442]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:35:03 np0005538338.novalocal systemd[1]: Started Session c186 of User root. Nov 27 19:35:03 np0005538338.novalocal sudo[97442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:35:03 np0005538338.novalocal sudo[97442]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:03 np0005538338.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Nov 27 19:35:03 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:35:03 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:35:03 np0005538338.novalocal iscsid[74253]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:35:03 np0005538338.novalocal sudo[97482]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:35:03 np0005538338.novalocal systemd[1]: Started Session c187 of User root. Nov 27 19:35:03 np0005538338.novalocal sudo[97482]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:04 np0005538338.novalocal sudo[97482]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:04 np0005538338.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:35:04 np0005538338.novalocal sudo[97491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:35:04 np0005538338.novalocal systemd[1]: Started Session c188 of User root. Nov 27 19:35:04 np0005538338.novalocal sudo[97491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:35:04 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:04 np0005538338.novalocal sudo[97491]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:04 np0005538338.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Nov 27 19:35:04 np0005538338.novalocal sudo[97500]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:35:04 np0005538338.novalocal systemd[1]: Started Session c189 of User root. Nov 27 19:35:04 np0005538338.novalocal sudo[97500]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:05 np0005538338.novalocal sudo[97500]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:05 np0005538338.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Nov 27 19:35:05 np0005538338.novalocal sudo[97505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:05 np0005538338.novalocal systemd[1]: Started Session c190 of User root. Nov 27 19:35:05 np0005538338.novalocal sudo[97505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:06 np0005538338.novalocal sudo[97505]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:06 np0005538338.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Nov 27 19:35:06 np0005538338.novalocal sudo[97511]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:06 np0005538338.novalocal systemd[1]: Started Session c191 of User root. Nov 27 19:35:06 np0005538338.novalocal sudo[97511]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:06 np0005538338.novalocal sudo[97511]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:06 np0005538338.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Nov 27 19:35:07 np0005538338.novalocal sudo[97525]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:07 np0005538338.novalocal systemd[1]: Started Session c192 of User root. Nov 27 19:35:07 np0005538338.novalocal sudo[97525]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:07 np0005538338.novalocal sudo[97525]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:07 np0005538338.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Nov 27 19:35:08 np0005538338.novalocal sudo[97529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d ZmYTa6W2jaF5BSxKwegB 9DUth6UHP5UZ6ZCf False -p3260 -a::1 Nov 27 19:35:08 np0005538338.novalocal systemd[1]: Started Session c193 of User root. Nov 27 19:35:08 np0005538338.novalocal sudo[97529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:08 np0005538338.novalocal sudo[97529]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:08 np0005538338.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Nov 27 19:35:08 np0005538338.novalocal sudo[97535]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:35:08 np0005538338.novalocal systemd[1]: Started Session c194 of User root. Nov 27 19:35:08 np0005538338.novalocal sudo[97535]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:09 np0005538338.novalocal sudo[97535]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:09 np0005538338.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Nov 27 19:35:09 np0005538338.novalocal sudo[97540]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:09 np0005538338.novalocal systemd[1]: Started Session c195 of User root. Nov 27 19:35:09 np0005538338.novalocal sudo[97540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:09 np0005538338.novalocal sudo[97540]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:09 np0005538338.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Nov 27 19:35:09 np0005538338.novalocal sudo[97545]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d ZmYTa6W2jaF5BSxKwegB 9DUth6UHP5UZ6ZCf iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:35:09 np0005538338.novalocal systemd[1]: Started Session c196 of User root. Nov 27 19:35:09 np0005538338.novalocal sudo[97545]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:10 np0005538338.novalocal sudo[97545]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:10 np0005538338.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Nov 27 19:35:10 np0005538338.novalocal sudo[97551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:10 np0005538338.novalocal systemd[1]: Started Session c197 of User root. Nov 27 19:35:10 np0005538338.novalocal sudo[97551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:10 np0005538338.novalocal sudo[97551]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:10 np0005538338.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Nov 27 19:35:10 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:35:10 np0005538338.novalocal iscsid[74253]: iscsid: Connection7:0 to [target: iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:35:11 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:35:11 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:35:11 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405e997d6f39f9249d48362ccae7 port group 0 rel port 1 Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:35:11 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:35:11 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:11 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:35:11 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:35:12 np0005538338.novalocal kernel: tap72eac49e-38: entered promiscuous mode Nov 27 19:35:12 np0005538338.novalocal NetworkManager[858]: [1764290112.1342] manager: (tap72eac49e-38): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Nov 27 19:35:12 np0005538338.novalocal systemd-udevd[97584]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:35:12 np0005538338.novalocal virtqemud[93072]: Domain id=6 name='instance-00000005' uuid=d684bf80-33c5-4d11-9968-c0e2e2c40060 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:35:12 np0005538338.novalocal virtqemud[93072]: Domain id=6 name='instance-00000005' uuid=d684bf80-33c5-4d11-9968-c0e2e2c40060 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:35:12 np0005538338.novalocal NetworkManager[858]: [1764290112.1529] device (tap72eac49e-38): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:35:12 np0005538338.novalocal NetworkManager[858]: [1764290112.1534] device (tap72eac49e-38): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:35:12 np0005538338.novalocal systemd-machined[90535]: New machine qemu-6-instance-00000005. Nov 27 19:35:12 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000005. Nov 27 19:35:12 np0005538338.novalocal sudo[97632]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:35:12 np0005538338.novalocal systemd[1]: Started Session c198 of User root. Nov 27 19:35:12 np0005538338.novalocal sudo[97632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:35:12 np0005538338.novalocal NetworkManager[858]: [1764290112.2642] manager: (tapa5cc8ff6-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:35:12 np0005538338.novalocal NetworkManager[858]: [1764290112.3254] device (tapa5cc8ff6-f0): carrier: link connected Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:35:12 np0005538338.novalocal kernel: tapa5cc8ff6-f0: entered promiscuous mode Nov 27 19:35:12 np0005538338.novalocal sudo[97632]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:12 np0005538338.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Nov 27 19:35:12 np0005538338.novalocal sudo[97677]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-a5cc8ff6-f492-4d69-a403-a172843779a6 env PROCESS_TAG=haproxy-a5cc8ff6-f492-4d69-a403-a172843779a6 haproxy -f /var/lib/neutron/ovn-metadata-proxy/a5cc8ff6-f492-4d69-a403-a172843779a6.conf Nov 27 19:35:12 np0005538338.novalocal sudo[97678]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:35:12 np0005538338.novalocal systemd[1]: Started Session c199 of User root. Nov 27 19:35:12 np0005538338.novalocal sudo[97677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:35:12 np0005538338.novalocal systemd[1]: Started Session c200 of User root. Nov 27 19:35:12 np0005538338.novalocal sudo[97678]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:35:12 np0005538338.novalocal sudo[97678]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:12 np0005538338.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:35:12 np0005538338.novalocal sudo[97677]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:12 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:12 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:35:12 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:13 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:35:13 np0005538338.novalocal iscsid[74253]: iscsid: Connection7:0 to [target: iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:35:13 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:13 np0005538338.novalocal sudo[97724]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:35:13 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:35:13 np0005538338.novalocal systemd[1]: Started Session c201 of User root. Nov 27 19:35:13 np0005538338.novalocal setroubleshoot[97419]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:35:13 np0005538338.novalocal sudo[97724]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:13 np0005538338.novalocal sudo[97724]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:13 np0005538338.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Nov 27 19:35:13 np0005538338.novalocal sudo[97730]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:13 np0005538338.novalocal systemd[1]: Started Session c202 of User root. Nov 27 19:35:13 np0005538338.novalocal sudo[97730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:14 np0005538338.novalocal sudo[97730]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:14 np0005538338.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Nov 27 19:35:14 np0005538338.novalocal sudo[97735]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:35:14 np0005538338.novalocal systemd[1]: Started Session c203 of User root. Nov 27 19:35:14 np0005538338.novalocal sudo[97735]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:14 np0005538338.novalocal sudo[97735]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:14 np0005538338.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Nov 27 19:35:14 np0005538338.novalocal sudo[97740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:14 np0005538338.novalocal systemd[1]: Started Session c204 of User root. Nov 27 19:35:14 np0005538338.novalocal sudo[97740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:15 np0005538338.novalocal sudo[97740]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:15 np0005538338.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Nov 27 19:35:15 np0005538338.novalocal sudo[97745]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:35:15 np0005538338.novalocal systemd[1]: Started Session c205 of User root. Nov 27 19:35:15 np0005538338.novalocal sudo[97745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:15 np0005538338.novalocal sudo[97745]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:15 np0005538338.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Nov 27 19:35:16 np0005538338.novalocal sudo[97750]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:35:16 np0005538338.novalocal systemd[1]: Started Session c206 of User root. Nov 27 19:35:16 np0005538338.novalocal sudo[97750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:16 np0005538338.novalocal sudo[97750]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:16 np0005538338.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Nov 27 19:35:16 np0005538338.novalocal sudo[97755]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:16 np0005538338.novalocal systemd[1]: Started Session c207 of User root. Nov 27 19:35:16 np0005538338.novalocal sudo[97755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:17 np0005538338.novalocal sudo[97755]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:17 np0005538338.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Nov 27 19:35:17 np0005538338.novalocal sudo[97761]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:17 np0005538338.novalocal systemd[1]: Started Session c208 of User root. Nov 27 19:35:17 np0005538338.novalocal sudo[97761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:17 np0005538338.novalocal sudo[97761]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:17 np0005538338.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Nov 27 19:35:17 np0005538338.novalocal sudo[97765]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-5566efe7-58d1-4908-be43-0ff60743351d Nov 27 19:35:17 np0005538338.novalocal systemd[1]: Started Session c209 of User root. Nov 27 19:35:17 np0005538338.novalocal sudo[97765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:17 np0005538338.novalocal lvm[97772]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:35:17 np0005538338.novalocal lvm[97772]: VG cinder-volumes finished Nov 27 19:35:17 np0005538338.novalocal sudo[97765]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:17 np0005538338.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Nov 27 19:35:18 np0005538338.novalocal sudo[97773]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:35:18 np0005538338.novalocal systemd[1]: Started Session c210 of User root. Nov 27 19:35:18 np0005538338.novalocal sudo[97773]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:18 np0005538338.novalocal sudo[97773]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:18 np0005538338.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Nov 27 19:35:18 np0005538338.novalocal sudo[97777]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:35:18 np0005538338.novalocal systemd[1]: Started Session c211 of User root. Nov 27 19:35:18 np0005538338.novalocal sudo[97777]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:18 np0005538338.novalocal sudo[97777]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:18 np0005538338.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Nov 27 19:35:18 np0005538338.novalocal sudo[97781]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:35:18 np0005538338.novalocal systemd[1]: Started Session c212 of User root. Nov 27 19:35:18 np0005538338.novalocal sudo[97781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:19 np0005538338.novalocal sudo[97781]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:19 np0005538338.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Nov 27 19:35:19 np0005538338.novalocal sudo[97785]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:35:19 np0005538338.novalocal systemd[1]: Started Session c213 of User root. Nov 27 19:35:19 np0005538338.novalocal sudo[97785]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:19 np0005538338.novalocal sudo[97785]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:19 np0005538338.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Nov 27 19:35:21 np0005538338.novalocal kernel: tap72eac49e-38 (unregistering): left promiscuous mode Nov 27 19:35:21 np0005538338.novalocal NetworkManager[858]: [1764290121.6118] device (tap72eac49e-38): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:35:21 np0005538338.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000005.scope: Deactivated successfully. Nov 27 19:35:21 np0005538338.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000005.scope: Consumed 7.591s CPU time. Nov 27 19:35:21 np0005538338.novalocal systemd-machined[90535]: Machine qemu-6-instance-00000005 terminated. Nov 27 19:35:21 np0005538338.novalocal kernel: tapa5cc8ff6-f0: left promiscuous mode Nov 27 19:35:21 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2da5cc8ff6\x2df492\x2d4d69\x2da403\x2da172843779a6.mount: Deactivated successfully. Nov 27 19:35:21 np0005538338.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Nov 27 19:35:23 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Deactivated successfully. Nov 27 19:35:23 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Consumed 1.291s CPU time. Nov 27 19:35:23 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:35:23 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 2.712s CPU time. Nov 27 19:35:29 np0005538338.novalocal sudo[97853]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:35:29 np0005538338.novalocal systemd[1]: Started Session c214 of User root. Nov 27 19:35:29 np0005538338.novalocal sudo[97853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:29 np0005538338.novalocal sudo[97853]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:29 np0005538338.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Nov 27 19:35:29 np0005538338.novalocal sudo[97893]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:35:29 np0005538338.novalocal systemd[1]: Started Session c215 of User root. Nov 27 19:35:29 np0005538338.novalocal sudo[97893]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:29 np0005538338.novalocal sudo[97893]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:29 np0005538338.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Nov 27 19:35:29 np0005538338.novalocal sudo[97897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:35:29 np0005538338.novalocal systemd[1]: Started Session c216 of User root. Nov 27 19:35:29 np0005538338.novalocal sudo[97897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:30 np0005538338.novalocal sudo[97897]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:30 np0005538338.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Nov 27 19:35:30 np0005538338.novalocal sudo[97901]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:35:30 np0005538338.novalocal systemd[1]: Started Session c217 of User root. Nov 27 19:35:30 np0005538338.novalocal sudo[97901]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:35:30 np0005538338.novalocal sudo[97901]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:30 np0005538338.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Nov 27 19:35:45 np0005538338.novalocal kernel: tap3691305c-98: entered promiscuous mode Nov 27 19:35:45 np0005538338.novalocal NetworkManager[858]: [1764290145.2964] manager: (tap3691305c-98): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Nov 27 19:35:45 np0005538338.novalocal virtqemud[93072]: Domain id=7 name='instance-00000006' uuid=9e163ab4-a788-4998-87ad-d8be2c9a5ffd is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:35:45 np0005538338.novalocal virtqemud[93072]: Domain id=7 name='instance-00000006' uuid=9e163ab4-a788-4998-87ad-d8be2c9a5ffd is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:35:45 np0005538338.novalocal systemd-machined[90535]: New machine qemu-7-instance-00000006. Nov 27 19:35:45 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Nov 27 19:35:45 np0005538338.novalocal systemd-udevd[97953]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:35:45 np0005538338.novalocal NetworkManager[858]: [1764290145.3828] device (tap3691305c-98): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:35:45 np0005538338.novalocal NetworkManager[858]: [1764290145.3835] device (tap3691305c-98): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:35:45 np0005538338.novalocal NetworkManager[858]: [1764290145.3991] manager: (tap0de61811-00): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Nov 27 19:35:45 np0005538338.novalocal NetworkManager[858]: [1764290145.4614] device (tap0de61811-00): carrier: link connected Nov 27 19:35:45 np0005538338.novalocal kernel: tap0de61811-00: entered promiscuous mode Nov 27 19:35:45 np0005538338.novalocal sudo[97991]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-0de61811-00d2-42ef-a2c8-91f130c6bdf5 env PROCESS_TAG=haproxy-0de61811-00d2-42ef-a2c8-91f130c6bdf5 haproxy -f /var/lib/neutron/ovn-metadata-proxy/0de61811-00d2-42ef-a2c8-91f130c6bdf5.conf Nov 27 19:35:45 np0005538338.novalocal systemd[1]: Started Session c218 of User root. Nov 27 19:35:45 np0005538338.novalocal sudo[97991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:35:46 np0005538338.novalocal sudo[97991]: pam_unix(sudo:session): session closed for user root Nov 27 19:35:53 np0005538338.novalocal kernel: tap3691305c-98 (unregistering): left promiscuous mode Nov 27 19:35:53 np0005538338.novalocal NetworkManager[858]: [1764290153.2543] device (tap3691305c-98): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:35:53 np0005538338.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Nov 27 19:35:53 np0005538338.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Nov 27 19:35:53 np0005538338.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 7.533s CPU time. Nov 27 19:35:53 np0005538338.novalocal kernel: tap0de61811-00: left promiscuous mode Nov 27 19:35:53 np0005538338.novalocal systemd-machined[90535]: Machine qemu-7-instance-00000006 terminated. Nov 27 19:35:53 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d0de61811\x2d00d2\x2d42ef\x2da2c8\x2d91f130c6bdf5.mount: Deactivated successfully. Nov 27 19:36:08 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:36:08 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:36:08 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:36:29 np0005538338.novalocal sshd-session[98081]: Received disconnect from 193.46.255.7 port 15240:11: [preauth] Nov 27 19:36:29 np0005538338.novalocal sshd-session[98081]: Disconnected from authenticating user root 193.46.255.7 port 15240 [preauth] Nov 27 19:36:29 np0005538338.novalocal sudo[98083]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:36:29 np0005538338.novalocal systemd[1]: Started Session c219 of User root. Nov 27 19:36:29 np0005538338.novalocal sudo[98083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:36:29 np0005538338.novalocal sudo[98083]: pam_unix(sudo:session): session closed for user root Nov 27 19:36:29 np0005538338.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Nov 27 19:36:29 np0005538338.novalocal sudo[98123]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:36:29 np0005538338.novalocal systemd[1]: Started Session c220 of User root. Nov 27 19:36:29 np0005538338.novalocal sudo[98123]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:36:29 np0005538338.novalocal sudo[98123]: pam_unix(sudo:session): session closed for user root Nov 27 19:36:29 np0005538338.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Nov 27 19:36:29 np0005538338.novalocal sudo[98127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:36:29 np0005538338.novalocal systemd[1]: Started Session c221 of User root. Nov 27 19:36:29 np0005538338.novalocal sudo[98127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:36:30 np0005538338.novalocal sudo[98127]: pam_unix(sudo:session): session closed for user root Nov 27 19:36:30 np0005538338.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Nov 27 19:36:30 np0005538338.novalocal sudo[98131]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:36:30 np0005538338.novalocal systemd[1]: Started Session c222 of User root. Nov 27 19:36:30 np0005538338.novalocal sudo[98131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:36:30 np0005538338.novalocal sudo[98131]: pam_unix(sudo:session): session closed for user root Nov 27 19:36:30 np0005538338.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Nov 27 19:36:48 np0005538338.novalocal sudo[98140]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-7342d0b2-31c3-47ee-9e80-d991673aa817 cinder-volumes/cinder-volumes-pool Nov 27 19:36:48 np0005538338.novalocal systemd[1]: Started Session c223 of User root. Nov 27 19:36:48 np0005538338.novalocal sudo[98140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:36:48 np0005538338.novalocal lvm[98151]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:36:48 np0005538338.novalocal lvm[98151]: VG cinder-volumes finished Nov 27 19:36:48 np0005538338.novalocal sudo[98140]: pam_unix(sudo:session): session closed for user root Nov 27 19:36:48 np0005538338.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Nov 27 19:36:53 np0005538338.novalocal kernel: tap590acf1b-63: entered promiscuous mode Nov 27 19:36:53 np0005538338.novalocal NetworkManager[858]: [1764290213.1194] manager: (tap590acf1b-63): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Nov 27 19:36:53 np0005538338.novalocal virtqemud[93072]: Domain id=8 name='instance-00000007' uuid=258983ba-cd73-4dce-b994-0bd1c3d0dfa3 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:36:53 np0005538338.novalocal virtqemud[93072]: Domain id=8 name='instance-00000007' uuid=258983ba-cd73-4dce-b994-0bd1c3d0dfa3 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:36:53 np0005538338.novalocal systemd-machined[90535]: New machine qemu-8-instance-00000007. Nov 27 19:36:53 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Nov 27 19:36:53 np0005538338.novalocal systemd-udevd[98187]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:36:53 np0005538338.novalocal NetworkManager[858]: [1764290213.1966] device (tap590acf1b-63): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:36:53 np0005538338.novalocal NetworkManager[858]: [1764290213.1977] device (tap590acf1b-63): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:36:53 np0005538338.novalocal NetworkManager[858]: [1764290213.2253] manager: (tap97d65d42-70): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Nov 27 19:36:53 np0005538338.novalocal NetworkManager[858]: [1764290213.2749] device (tap97d65d42-70): carrier: link connected Nov 27 19:36:53 np0005538338.novalocal kernel: tap97d65d42-70: entered promiscuous mode Nov 27 19:36:53 np0005538338.novalocal sudo[98230]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7 env PROCESS_TAG=haproxy-97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7.conf Nov 27 19:36:53 np0005538338.novalocal systemd[1]: Started Session c224 of User root. Nov 27 19:36:53 np0005538338.novalocal sudo[98230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:36:53 np0005538338.novalocal sudo[98230]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:01 np0005538338.novalocal kernel: tap590acf1b-63 (unregistering): left promiscuous mode Nov 27 19:37:01 np0005538338.novalocal NetworkManager[858]: [1764290221.5916] device (tap590acf1b-63): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:37:01 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:37:01 np0005538338.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Nov 27 19:37:01 np0005538338.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 8.525s CPU time. Nov 27 19:37:01 np0005538338.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Nov 27 19:37:01 np0005538338.novalocal kernel: tap97d65d42-70: left promiscuous mode Nov 27 19:37:01 np0005538338.novalocal systemd-machined[90535]: Machine qemu-8-instance-00000007 terminated. Nov 27 19:37:01 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d97d65d42\x2d7c5a\x2d4e14\x2dbfc3\x2d7504e2b8bcb7.mount: Deactivated successfully. Nov 27 19:37:01 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:37:01 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:37:01 np0005538338.novalocal kernel: tap590acf1b-63: entered promiscuous mode Nov 27 19:37:01 np0005538338.novalocal NetworkManager[858]: [1764290221.7991] manager: (tap590acf1b-63): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Nov 27 19:37:01 np0005538338.novalocal kernel: tap590acf1b-63 (unregistering): left promiscuous mode Nov 27 19:37:01 np0005538338.novalocal systemd-udevd[98287]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:37:01 np0005538338.novalocal NetworkManager[858]: [1764290221.9480] manager: (tap97d65d42-70): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Nov 27 19:37:02 np0005538338.novalocal NetworkManager[858]: [1764290222.0163] device (tap97d65d42-70): carrier: link connected Nov 27 19:37:02 np0005538338.novalocal kernel: tap97d65d42-70: entered promiscuous mode Nov 27 19:37:02 np0005538338.novalocal sudo[98333]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7 env PROCESS_TAG=haproxy-97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/97d65d42-7c5a-4e14-bfc3-7504e2b8bcb7.conf Nov 27 19:37:02 np0005538338.novalocal systemd[1]: Started Session c225 of User root. Nov 27 19:37:02 np0005538338.novalocal sudo[98333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:37:02 np0005538338.novalocal sudo[98333]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:02 np0005538338.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Nov 27 19:37:02 np0005538338.novalocal kernel: tap97d65d42-70: left promiscuous mode Nov 27 19:37:02 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d97d65d42\x2d7c5a\x2d4e14\x2dbfc3\x2d7504e2b8bcb7.mount: Deactivated successfully. Nov 27 19:37:11 np0005538338.novalocal sudo[98352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-7342d0b2-31c3-47ee-9e80-d991673aa817 Nov 27 19:37:12 np0005538338.novalocal systemd[1]: Started Session c226 of User root. Nov 27 19:37:12 np0005538338.novalocal sudo[98352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:12 np0005538338.novalocal sudo[98352]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:12 np0005538338.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Nov 27 19:37:12 np0005538338.novalocal sudo[98356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-7342d0b2-31c3-47ee-9e80-d991673aa817 Nov 27 19:37:12 np0005538338.novalocal systemd[1]: Started Session c227 of User root. Nov 27 19:37:12 np0005538338.novalocal sudo[98356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:12 np0005538338.novalocal sudo[98356]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:12 np0005538338.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Nov 27 19:37:12 np0005538338.novalocal sudo[98360]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-7342d0b2-31c3-47ee-9e80-d991673aa817 Nov 27 19:37:12 np0005538338.novalocal systemd[1]: Started Session c228 of User root. Nov 27 19:37:12 np0005538338.novalocal sudo[98360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:13 np0005538338.novalocal lvm[98367]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:13 np0005538338.novalocal lvm[98367]: VG cinder-volumes finished Nov 27 19:37:13 np0005538338.novalocal sudo[98360]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:13 np0005538338.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Nov 27 19:37:13 np0005538338.novalocal sudo[98368]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:13 np0005538338.novalocal systemd[1]: Started Session c229 of User root. Nov 27 19:37:13 np0005538338.novalocal sudo[98368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:13 np0005538338.novalocal sudo[98368]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:14 np0005538338.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Nov 27 19:37:14 np0005538338.novalocal sudo[98372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:14 np0005538338.novalocal systemd[1]: Started Session c230 of User root. Nov 27 19:37:14 np0005538338.novalocal sudo[98372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:14 np0005538338.novalocal sudo[98372]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:14 np0005538338.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Nov 27 19:37:14 np0005538338.novalocal sudo[98376]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:14 np0005538338.novalocal systemd[1]: Started Session c231 of User root. Nov 27 19:37:14 np0005538338.novalocal sudo[98376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:14 np0005538338.novalocal sudo[98376]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:14 np0005538338.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Nov 27 19:37:14 np0005538338.novalocal sudo[98381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:14 np0005538338.novalocal systemd[1]: Started Session c232 of User root. Nov 27 19:37:14 np0005538338.novalocal sudo[98381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:15 np0005538338.novalocal sudo[98381]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:15 np0005538338.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Nov 27 19:37:19 np0005538338.novalocal sudo[98388]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-dc73df32-f4ff-4440-9f90-01c177f3540c cinder-volumes/cinder-volumes-pool Nov 27 19:37:19 np0005538338.novalocal systemd[1]: Started Session c233 of User root. Nov 27 19:37:19 np0005538338.novalocal sudo[98388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:19 np0005538338.novalocal lvm[98399]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:19 np0005538338.novalocal lvm[98399]: VG cinder-volumes finished Nov 27 19:37:19 np0005538338.novalocal sudo[98388]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:19 np0005538338.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Nov 27 19:37:21 np0005538338.novalocal sudo[98400]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2791d8a6-9022-46a4-9c65-52a1397406c9 cinder-volumes/cinder-volumes-pool Nov 27 19:37:21 np0005538338.novalocal systemd[1]: Started Session c234 of User root. Nov 27 19:37:21 np0005538338.novalocal sudo[98400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:21 np0005538338.novalocal lvm[98409]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:21 np0005538338.novalocal lvm[98409]: VG cinder-volumes finished Nov 27 19:37:21 np0005538338.novalocal sudo[98400]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:21 np0005538338.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Nov 27 19:37:22 np0005538338.novalocal sudo[98410]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-2791d8a6-9022-46a4-9c65-52a1397406c9 Nov 27 19:37:22 np0005538338.novalocal systemd[1]: Started Session c235 of User root. Nov 27 19:37:22 np0005538338.novalocal sudo[98410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:22 np0005538338.novalocal sudo[98410]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:22 np0005538338.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Nov 27 19:37:22 np0005538338.novalocal sudo[98414]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-2791d8a6-9022-46a4-9c65-52a1397406c9 Nov 27 19:37:22 np0005538338.novalocal systemd[1]: Started Session c236 of User root. Nov 27 19:37:22 np0005538338.novalocal sudo[98414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:23 np0005538338.novalocal sudo[98414]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:23 np0005538338.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Nov 27 19:37:23 np0005538338.novalocal sudo[98418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-2791d8a6-9022-46a4-9c65-52a1397406c9 Nov 27 19:37:23 np0005538338.novalocal systemd[1]: Started Session c237 of User root. Nov 27 19:37:23 np0005538338.novalocal sudo[98418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:23 np0005538338.novalocal lvm[98425]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:23 np0005538338.novalocal lvm[98425]: VG cinder-volumes finished Nov 27 19:37:23 np0005538338.novalocal sudo[98418]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:23 np0005538338.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Nov 27 19:37:23 np0005538338.novalocal sudo[98426]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:23 np0005538338.novalocal systemd[1]: Started Session c238 of User root. Nov 27 19:37:23 np0005538338.novalocal sudo[98426]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:24 np0005538338.novalocal sudo[98426]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:24 np0005538338.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Nov 27 19:37:24 np0005538338.novalocal sudo[98430]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:24 np0005538338.novalocal systemd[1]: Started Session c239 of User root. Nov 27 19:37:24 np0005538338.novalocal sudo[98430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:24 np0005538338.novalocal sudo[98434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-dc73df32-f4ff-4440-9f90-01c177f3540c Nov 27 19:37:24 np0005538338.novalocal systemd[1]: Started Session c240 of User root. Nov 27 19:37:24 np0005538338.novalocal sudo[98434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:24 np0005538338.novalocal sudo[98430]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:24 np0005538338.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Nov 27 19:37:24 np0005538338.novalocal sudo[98437]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:24 np0005538338.novalocal systemd[1]: Started Session c241 of User root. Nov 27 19:37:24 np0005538338.novalocal sudo[98437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:24 np0005538338.novalocal sudo[98434]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:24 np0005538338.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Nov 27 19:37:24 np0005538338.novalocal sudo[98442]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-dc73df32-f4ff-4440-9f90-01c177f3540c Nov 27 19:37:24 np0005538338.novalocal systemd[1]: Started Session c242 of User root. Nov 27 19:37:24 np0005538338.novalocal sudo[98442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:24 np0005538338.novalocal sudo[98437]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:24 np0005538338.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Nov 27 19:37:24 np0005538338.novalocal sudo[98445]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:25 np0005538338.novalocal systemd[1]: Started Session c243 of User root. Nov 27 19:37:25 np0005538338.novalocal sudo[98445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:25 np0005538338.novalocal sudo[98442]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:25 np0005538338.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Nov 27 19:37:25 np0005538338.novalocal sudo[98449]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-dc73df32-f4ff-4440-9f90-01c177f3540c Nov 27 19:37:25 np0005538338.novalocal systemd[1]: Started Session c244 of User root. Nov 27 19:37:25 np0005538338.novalocal sudo[98449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:25 np0005538338.novalocal sudo[98445]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:25 np0005538338.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Nov 27 19:37:25 np0005538338.novalocal lvm[98455]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:25 np0005538338.novalocal lvm[98455]: VG cinder-volumes finished Nov 27 19:37:25 np0005538338.novalocal sudo[98449]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:25 np0005538338.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Nov 27 19:37:25 np0005538338.novalocal sudo[98456]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:25 np0005538338.novalocal systemd[1]: Started Session c245 of User root. Nov 27 19:37:25 np0005538338.novalocal sudo[98456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:26 np0005538338.novalocal sudo[98456]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:26 np0005538338.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Nov 27 19:37:26 np0005538338.novalocal sudo[98460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:26 np0005538338.novalocal systemd[1]: Started Session c246 of User root. Nov 27 19:37:26 np0005538338.novalocal sudo[98460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:26 np0005538338.novalocal sudo[98460]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:26 np0005538338.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Nov 27 19:37:26 np0005538338.novalocal sudo[98464]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:26 np0005538338.novalocal systemd[1]: Started Session c247 of User root. Nov 27 19:37:26 np0005538338.novalocal sudo[98464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:27 np0005538338.novalocal sudo[98464]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:27 np0005538338.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Nov 27 19:37:27 np0005538338.novalocal sudo[98477]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:27 np0005538338.novalocal systemd[1]: Started Session c248 of User root. Nov 27 19:37:27 np0005538338.novalocal sudo[98477]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:27 np0005538338.novalocal sudo[98479]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:37:27 np0005538338.novalocal systemd[1]: Started Session c249 of User root. Nov 27 19:37:27 np0005538338.novalocal sudo[98479]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:27 np0005538338.novalocal sudo[98477]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:27 np0005538338.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Nov 27 19:37:27 np0005538338.novalocal sudo[98479]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:27 np0005538338.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Nov 27 19:37:27 np0005538338.novalocal sudo[98485]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd False -p3260 -a::1 Nov 27 19:37:27 np0005538338.novalocal systemd[1]: Started Session c250 of User root. Nov 27 19:37:27 np0005538338.novalocal sudo[98485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:28 np0005538338.novalocal sudo[98485]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:28 np0005538338.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Nov 27 19:37:28 np0005538338.novalocal sudo[98491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:37:28 np0005538338.novalocal systemd[1]: Started Session c251 of User root. Nov 27 19:37:28 np0005538338.novalocal sudo[98491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:28 np0005538338.novalocal sudo[98491]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:28 np0005538338.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Nov 27 19:37:28 np0005538338.novalocal sudo[98496]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:37:28 np0005538338.novalocal systemd[1]: Started Session c252 of User root. Nov 27 19:37:28 np0005538338.novalocal sudo[98496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:29 np0005538338.novalocal sudo[98499]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:29 np0005538338.novalocal systemd[1]: Started Session c253 of User root. Nov 27 19:37:29 np0005538338.novalocal sudo[98499]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:29 np0005538338.novalocal sudo[98496]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:29 np0005538338.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Nov 27 19:37:29 np0005538338.novalocal sudo[98499]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:29 np0005538338.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Nov 27 19:37:29 np0005538338.novalocal sudo[98505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Gb5xnCDNh45XucSkUX3z eyj44S2m3mBNdgUd iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:37:29 np0005538338.novalocal systemd[1]: Started Session c254 of User root. Nov 27 19:37:29 np0005538338.novalocal sudo[98507]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:29 np0005538338.novalocal sudo[98505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:29 np0005538338.novalocal systemd[1]: Started Session c255 of User root. Nov 27 19:37:29 np0005538338.novalocal sudo[98507]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:29 np0005538338.novalocal sudo[98507]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:29 np0005538338.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Nov 27 19:37:29 np0005538338.novalocal sudo[98550]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:29 np0005538338.novalocal systemd[1]: Started Session c256 of User root. Nov 27 19:37:29 np0005538338.novalocal sudo[98550]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:29 np0005538338.novalocal sudo[98505]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:29 np0005538338.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Nov 27 19:37:29 np0005538338.novalocal sudo[98553]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:37:29 np0005538338.novalocal systemd[1]: Started Session c257 of User root. Nov 27 19:37:29 np0005538338.novalocal sudo[98553]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:30 np0005538338.novalocal sudo[98550]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:30 np0005538338.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Nov 27 19:37:30 np0005538338.novalocal sudo[98558]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:30 np0005538338.novalocal systemd[1]: Started Session c258 of User root. Nov 27 19:37:30 np0005538338.novalocal sudo[98558]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:30 np0005538338.novalocal sudo[98553]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:30 np0005538338.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Nov 27 19:37:30 np0005538338.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Nov 27 19:37:30 np0005538338.novalocal sudo[98558]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:30 np0005538338.novalocal iscsid[74253]: iscsid: Connection8:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is operational now Nov 27 19:37:30 np0005538338.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Nov 27 19:37:30 np0005538338.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Nov 27 19:37:30 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Nov 27 19:37:30 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405a2b24512c40343fb85182ddb6 port group 0 rel port 1 Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Nov 27 19:37:30 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Nov 27 19:37:30 np0005538338.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Nov 27 19:37:30 np0005538338.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 27 19:37:30 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:37:30 np0005538338.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Nov 27 19:37:30 np0005538338.novalocal kernel: GPT:229375 != 2097151 Nov 27 19:37:30 np0005538338.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Nov 27 19:37:30 np0005538338.novalocal kernel: sda: sda1 sda15 Nov 27 19:37:30 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Nov 27 19:37:31 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:37:31 np0005538338.novalocal sudo[98604]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Nov 27 19:37:31 np0005538338.novalocal systemd[1]: Started Session c259 of User root. Nov 27 19:37:31 np0005538338.novalocal sudo[98604]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:37:32 np0005538338.novalocal sudo[98604]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:32 np0005538338.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Nov 27 19:37:32 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:37:33 np0005538338.novalocal sudo[98613]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Nov 27 19:37:33 np0005538338.novalocal systemd[1]: Started Session c260 of User root. Nov 27 19:37:33 np0005538338.novalocal sudo[98613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Nov 27 19:37:33 np0005538338.novalocal setroubleshoot[98603]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Nov 27 19:37:33 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service. Nov 27 19:37:33 np0005538338.novalocal sudo[98613]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:33 np0005538338.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Nov 27 19:37:33 np0005538338.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Nov 27 19:37:33 np0005538338.novalocal kernel: scsi 2:0:0:0: alua: Detached Nov 27 19:37:33 np0005538338.novalocal iscsid[74253]: iscsid: Connection8:0 to [target: iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398, portal: ::1,3260] through [iface: default] is shutdown. Nov 27 19:37:33 np0005538338.novalocal sudo[98654]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 iqn.1994-05.com.redhat:1b949dc447ae Nov 27 19:37:33 np0005538338.novalocal systemd[1]: Started Session c261 of User root. Nov 27 19:37:33 np0005538338.novalocal sudo[98654]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:34 np0005538338.novalocal sudo[98654]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:34 np0005538338.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Nov 27 19:37:34 np0005538338.novalocal sudo[98662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:37:34 np0005538338.novalocal systemd[1]: Started Session c262 of User root. Nov 27 19:37:34 np0005538338.novalocal sudo[98662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l c14dc1c2-17eb-41ad-a42c-0b200d7db232 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 497431b9-4dd9-4b1a-83fd-f987f5624c38 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a9a559ff-dd0b-4930-9d61-5a6d5231f16c Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 732865bf-b9a8-4aba-b01e-1a1a0831291d Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 69eebf79-667e-4b7f-90a9-253529921364 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 75015b1c-5148-4189-8be8-ac4945694106 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l 785a5b1c-69e5-42f5-93ac-cd82ced36ed1 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal sudo[98662]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:34 np0005538338.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:37:34 np0005538338.novalocal sudo[98672]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 84fa0df8-d494-42f5-9ceb-da8268ba3998 Nov 27 19:37:34 np0005538338.novalocal systemd[1]: Started Session c263 of User root. Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal sudo[98672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 728d8040-2d04-4ac2-8361-81aa713dbab9 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5b1bf20-dcdd-48f2-a3e5-01ac267a74a5 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l ccd9875c-ea3c-4d0e-8e79-bce61b76a60a Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l ffa041cf-c7b2-46ed-b2fb-6cff0bf73969 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 0a529a52-aaac-4607-95d8-ce2e00f11db6 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l e145815b-7296-4dc2-91a5-a6e460c80d66 Nov 27 19:37:34 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 84a0510a-45fb-455d-9c26-56bb5ccc2d5b Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9147a4af-741c-48d3-8d28-e1c7bd9b33bc Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 2aa3b351-a14d-480b-a1af-8c511f034a7e Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 8fe60fd3-e14b-4f75-a76d-64faa646c133 Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l 084071f2-2ee1-4a05-99f7-a9338b5b618f Nov 27 19:37:35 np0005538338.novalocal setroubleshoot[98603]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Nov 27 19:37:35 np0005538338.novalocal sudo[98672]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:35 np0005538338.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Nov 27 19:37:35 np0005538338.novalocal sudo[98679]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-a608a7a7-7281-4eb5-943e-8fc323afb398 Nov 27 19:37:35 np0005538338.novalocal systemd[1]: Started Session c264 of User root. Nov 27 19:37:35 np0005538338.novalocal sudo[98679]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:35 np0005538338.novalocal sudo[98679]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:35 np0005538338.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Nov 27 19:37:35 np0005538338.novalocal sudo[98684]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Nov 27 19:37:35 np0005538338.novalocal systemd[1]: Started Session c265 of User root. Nov 27 19:37:35 np0005538338.novalocal sudo[98684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:36 np0005538338.novalocal sudo[98684]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:36 np0005538338.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Nov 27 19:37:36 np0005538338.novalocal sudo[98689]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:36 np0005538338.novalocal systemd[1]: Started Session c266 of User root. Nov 27 19:37:36 np0005538338.novalocal sudo[98689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:36 np0005538338.novalocal sudo[98689]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:36 np0005538338.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Nov 27 19:37:37 np0005538338.novalocal sudo[98694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:37 np0005538338.novalocal systemd[1]: Started Session c267 of User root. Nov 27 19:37:37 np0005538338.novalocal sudo[98694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:37 np0005538338.novalocal sudo[98694]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:37 np0005538338.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Nov 27 19:37:37 np0005538338.novalocal sudo[98703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:37 np0005538338.novalocal systemd[1]: Started Session c268 of User root. Nov 27 19:37:37 np0005538338.novalocal sudo[98703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:37 np0005538338.novalocal sudo[98703]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:37 np0005538338.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Nov 27 19:37:37 np0005538338.novalocal sudo[98708]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:37 np0005538338.novalocal systemd[1]: Started Session c269 of User root. Nov 27 19:37:37 np0005538338.novalocal sudo[98708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:38 np0005538338.novalocal sudo[98708]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:38 np0005538338.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Nov 27 19:37:38 np0005538338.novalocal sudo[98714]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-26a47c9b-ddd5-440e-889e-5af1b3405f7e cinder-volumes/cinder-volumes-pool Nov 27 19:37:38 np0005538338.novalocal systemd[1]: Started Session c270 of User root. Nov 27 19:37:38 np0005538338.novalocal sudo[98714]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:38 np0005538338.novalocal lvm[98725]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:38 np0005538338.novalocal lvm[98725]: VG cinder-volumes finished Nov 27 19:37:38 np0005538338.novalocal sudo[98714]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:38 np0005538338.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Nov 27 19:37:39 np0005538338.novalocal sudo[98726]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_download_bda24785-0687-4c19-b374-25e68e099e3d_4ohcyxed Nov 27 19:37:39 np0005538338.novalocal systemd[1]: Started Session c271 of User root. Nov 27 19:37:39 np0005538338.novalocal sudo[98726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:39 np0005538338.novalocal sudo[98726]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:39 np0005538338.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Nov 27 19:37:39 np0005538338.novalocal sudo[98731]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_download_bda24785-0687-4c19-b374-25e68e099e3d_4ohcyxed Nov 27 19:37:39 np0005538338.novalocal systemd[1]: Started Session c272 of User root. Nov 27 19:37:39 np0005538338.novalocal sudo[98731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:39 np0005538338.novalocal sudo[98731]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:39 np0005538338.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Nov 27 19:37:40 np0005538338.novalocal sudo[98736]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:40 np0005538338.novalocal systemd[1]: Started Session c273 of User root. Nov 27 19:37:40 np0005538338.novalocal sudo[98736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:40 np0005538338.novalocal sudo[98736]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:40 np0005538338.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Nov 27 19:37:40 np0005538338.novalocal sudo[98741]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:40 np0005538338.novalocal systemd[1]: Started Session c274 of User root. Nov 27 19:37:40 np0005538338.novalocal sudo[98741]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:40 np0005538338.novalocal sudo[98741]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:40 np0005538338.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Nov 27 19:37:40 np0005538338.novalocal sudo[98747]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf dd count=0 if=/var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 of=/dev/mapper/cinder--volumes-volume--26a47c9b--ddd5--440e--889e--5af1b3405f7e oflag=direct Nov 27 19:37:40 np0005538338.novalocal systemd[1]: Started Session c275 of User root. Nov 27 19:37:40 np0005538338.novalocal sudo[98747]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:41 np0005538338.novalocal sudo[98747]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:41 np0005538338.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Nov 27 19:37:41 np0005538338.novalocal sudo[98752]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf qemu-img convert -O raw -t none -f raw /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 /dev/mapper/cinder--volumes-volume--26a47c9b--ddd5--440e--889e--5af1b3405f7e Nov 27 19:37:41 np0005538338.novalocal systemd[1]: Started Session c276 of User root. Nov 27 19:37:41 np0005538338.novalocal sudo[98752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:42 np0005538338.novalocal sudo[98752]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:42 np0005538338.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Nov 27 19:37:42 np0005538338.novalocal sudo[98768]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:42 np0005538338.novalocal systemd[1]: Started Session c277 of User root. Nov 27 19:37:42 np0005538338.novalocal sudo[98768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:42 np0005538338.novalocal sudo[98768]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:42 np0005538338.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Nov 27 19:37:42 np0005538338.novalocal sudo[98773]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_bda24785-0687-4c19-b374-25e68e099e3d_zye_chrfnp0005538338.novalocal@BACKEND_1 Nov 27 19:37:42 np0005538338.novalocal systemd[1]: Started Session c278 of User root. Nov 27 19:37:42 np0005538338.novalocal sudo[98773]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:43 np0005538338.novalocal sudo[98773]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:43 np0005538338.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Nov 27 19:37:44 np0005538338.novalocal sudo[98779]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-526c68c4-ea54-4c54-8ab7-90be80d2a5b2 cinder-volumes/cinder-volumes-pool Nov 27 19:37:44 np0005538338.novalocal systemd[1]: Started Session c279 of User root. Nov 27 19:37:44 np0005538338.novalocal sudo[98779]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:44 np0005538338.novalocal lvm[98789]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:44 np0005538338.novalocal lvm[98789]: VG cinder-volumes finished Nov 27 19:37:44 np0005538338.novalocal sudo[98779]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:44 np0005538338.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Nov 27 19:37:45 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service: Deactivated successfully. Nov 27 19:37:45 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service: Consumed 1.293s CPU time. Nov 27 19:37:45 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:37:45 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 2.121s CPU time. Nov 27 19:37:45 np0005538338.novalocal sudo[98790]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-526c68c4-ea54-4c54-8ab7-90be80d2a5b2 Nov 27 19:37:45 np0005538338.novalocal systemd[1]: Started Session c280 of User root. Nov 27 19:37:45 np0005538338.novalocal sudo[98790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:45 np0005538338.novalocal sudo[98790]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:45 np0005538338.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Nov 27 19:37:45 np0005538338.novalocal sudo[98794]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-526c68c4-ea54-4c54-8ab7-90be80d2a5b2 Nov 27 19:37:45 np0005538338.novalocal systemd[1]: Started Session c281 of User root. Nov 27 19:37:45 np0005538338.novalocal sudo[98794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:46 np0005538338.novalocal sudo[98794]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:46 np0005538338.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Nov 27 19:37:46 np0005538338.novalocal sudo[98798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-526c68c4-ea54-4c54-8ab7-90be80d2a5b2 Nov 27 19:37:46 np0005538338.novalocal systemd[1]: Started Session c282 of User root. Nov 27 19:37:46 np0005538338.novalocal sudo[98798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:46 np0005538338.novalocal lvm[98805]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:46 np0005538338.novalocal lvm[98805]: VG cinder-volumes finished Nov 27 19:37:46 np0005538338.novalocal sudo[98798]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:46 np0005538338.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Nov 27 19:37:46 np0005538338.novalocal sudo[98806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:46 np0005538338.novalocal systemd[1]: Started Session c283 of User root. Nov 27 19:37:46 np0005538338.novalocal sudo[98806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:47 np0005538338.novalocal sudo[98806]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:47 np0005538338.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Nov 27 19:37:47 np0005538338.novalocal sudo[98812]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:47 np0005538338.novalocal systemd[1]: Started Session c284 of User root. Nov 27 19:37:47 np0005538338.novalocal sudo[98812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:47 np0005538338.novalocal sudo[98812]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:47 np0005538338.novalocal sudo[98816]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-26a47c9b-ddd5-440e-889e-5af1b3405f7e Nov 27 19:37:47 np0005538338.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Nov 27 19:37:47 np0005538338.novalocal systemd[1]: Started Session c285 of User root. Nov 27 19:37:47 np0005538338.novalocal sudo[98816]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:47 np0005538338.novalocal sudo[98818]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:47 np0005538338.novalocal systemd[1]: Started Session c286 of User root. Nov 27 19:37:47 np0005538338.novalocal sudo[98818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:47 np0005538338.novalocal sudo[98816]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:47 np0005538338.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Nov 27 19:37:47 np0005538338.novalocal sudo[98824]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-26a47c9b-ddd5-440e-889e-5af1b3405f7e Nov 27 19:37:47 np0005538338.novalocal systemd[1]: Started Session c287 of User root. Nov 27 19:37:47 np0005538338.novalocal sudo[98824]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:47 np0005538338.novalocal sudo[98818]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:47 np0005538338.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Nov 27 19:37:47 np0005538338.novalocal sudo[98827]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:47 np0005538338.novalocal systemd[1]: Started Session c288 of User root. Nov 27 19:37:47 np0005538338.novalocal sudo[98827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:48 np0005538338.novalocal sudo[98824]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:48 np0005538338.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Nov 27 19:37:48 np0005538338.novalocal sudo[98832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-26a47c9b-ddd5-440e-889e-5af1b3405f7e Nov 27 19:37:48 np0005538338.novalocal sudo[98827]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:48 np0005538338.novalocal systemd[1]: Started Session c289 of User root. Nov 27 19:37:48 np0005538338.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Nov 27 19:37:48 np0005538338.novalocal sudo[98832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:48 np0005538338.novalocal lvm[98837]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:37:48 np0005538338.novalocal lvm[98837]: VG cinder-volumes finished Nov 27 19:37:48 np0005538338.novalocal sudo[98832]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:48 np0005538338.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Nov 27 19:37:48 np0005538338.novalocal sudo[98838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:37:48 np0005538338.novalocal systemd[1]: Started Session c290 of User root. Nov 27 19:37:48 np0005538338.novalocal sudo[98838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:49 np0005538338.novalocal sudo[98838]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:49 np0005538338.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Nov 27 19:37:49 np0005538338.novalocal sudo[98843]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:49 np0005538338.novalocal systemd[1]: Started Session c291 of User root. Nov 27 19:37:49 np0005538338.novalocal sudo[98843]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:49 np0005538338.novalocal sudo[98843]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:49 np0005538338.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Nov 27 19:37:49 np0005538338.novalocal sudo[98847]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:37:49 np0005538338.novalocal systemd[1]: Started Session c292 of User root. Nov 27 19:37:49 np0005538338.novalocal sudo[98847]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:49 np0005538338.novalocal sudo[98847]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:49 np0005538338.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Nov 27 19:37:50 np0005538338.novalocal sudo[98851]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:37:50 np0005538338.novalocal systemd[1]: Started Session c293 of User root. Nov 27 19:37:50 np0005538338.novalocal sudo[98851]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:37:50 np0005538338.novalocal sudo[98851]: pam_unix(sudo:session): session closed for user root Nov 27 19:37:50 np0005538338.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Nov 27 19:38:08 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:38:08 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:38:08 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:38:27 np0005538338.novalocal sudo[98881]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-c480f9ae-3058-45d7-95da-d0f6fc41e60b cinder-volumes/cinder-volumes-pool Nov 27 19:38:27 np0005538338.novalocal systemd[1]: Started Session c294 of User root. Nov 27 19:38:27 np0005538338.novalocal sudo[98881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:28 np0005538338.novalocal lvm[98893]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:28 np0005538338.novalocal lvm[98893]: VG cinder-volumes finished Nov 27 19:38:28 np0005538338.novalocal sudo[98881]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:28 np0005538338.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Nov 27 19:38:28 np0005538338.novalocal sudo[98894]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-bd793f78-a662-4cae-b02c-89b266fcd06e cinder-volumes/cinder-volumes-pool Nov 27 19:38:28 np0005538338.novalocal systemd[1]: Started Session c295 of User root. Nov 27 19:38:28 np0005538338.novalocal sudo[98894]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:29 np0005538338.novalocal sudo[98897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:38:29 np0005538338.novalocal systemd[1]: Started Session c296 of User root. Nov 27 19:38:29 np0005538338.novalocal sudo[98897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:29 np0005538338.novalocal lvm[98907]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:29 np0005538338.novalocal lvm[98907]: VG cinder-volumes finished Nov 27 19:38:29 np0005538338.novalocal sudo[98894]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:29 np0005538338.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Nov 27 19:38:29 np0005538338.novalocal sudo[98897]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:29 np0005538338.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Nov 27 19:38:29 np0005538338.novalocal sudo[98918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:29 np0005538338.novalocal systemd[1]: Started Session c297 of User root. Nov 27 19:38:29 np0005538338.novalocal sudo[98918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:29 np0005538338.novalocal sudo[98918]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:29 np0005538338.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Nov 27 19:38:30 np0005538338.novalocal sudo[98963]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:38:30 np0005538338.novalocal systemd[1]: Started Session c298 of User root. Nov 27 19:38:30 np0005538338.novalocal sudo[98963]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:30 np0005538338.novalocal sudo[98966]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6099473e-e4d4-4caa-85f2-44ef417117d9 cinder-volumes/cinder-volumes-pool Nov 27 19:38:30 np0005538338.novalocal systemd[1]: Started Session c299 of User root. Nov 27 19:38:30 np0005538338.novalocal sudo[98966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:30 np0005538338.novalocal sudo[98963]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:30 np0005538338.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Nov 27 19:38:30 np0005538338.novalocal sudo[98970]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:30 np0005538338.novalocal systemd[1]: Started Session c300 of User root. Nov 27 19:38:30 np0005538338.novalocal sudo[98970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:30 np0005538338.novalocal lvm[98979]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:30 np0005538338.novalocal lvm[98979]: VG cinder-volumes finished Nov 27 19:38:30 np0005538338.novalocal sudo[98966]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:30 np0005538338.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Nov 27 19:38:30 np0005538338.novalocal sudo[98970]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:30 np0005538338.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Nov 27 19:38:31 np0005538338.novalocal kernel: tapda9f07b3-bd: entered promiscuous mode Nov 27 19:38:31 np0005538338.novalocal NetworkManager[858]: [1764290311.0877] manager: (tapda9f07b3-bd): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Nov 27 19:38:31 np0005538338.novalocal virtqemud[93072]: Domain id=9 name='instance-00000008' uuid=878a4214-b543-46cf-a8b7-cf32268f2c22 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:38:31 np0005538338.novalocal virtqemud[93072]: Domain id=9 name='instance-00000008' uuid=878a4214-b543-46cf-a8b7-cf32268f2c22 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:38:31 np0005538338.novalocal systemd-machined[90535]: New machine qemu-9-instance-00000008. Nov 27 19:38:31 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Nov 27 19:38:31 np0005538338.novalocal systemd-udevd[99003]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:38:31 np0005538338.novalocal NetworkManager[858]: [1764290311.1954] device (tapda9f07b3-bd): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:38:31 np0005538338.novalocal NetworkManager[858]: [1764290311.1962] device (tapda9f07b3-bd): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:38:31 np0005538338.novalocal NetworkManager[858]: [1764290311.2386] manager: (tap15422770-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/28) Nov 27 19:38:31 np0005538338.novalocal NetworkManager[858]: [1764290311.3086] device (tap15422770-f0): carrier: link connected Nov 27 19:38:31 np0005538338.novalocal sudo[99043]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6099473e-e4d4-4caa-85f2-44ef417117d9 Nov 27 19:38:31 np0005538338.novalocal systemd[1]: Started Session c301 of User root. Nov 27 19:38:31 np0005538338.novalocal sudo[99043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:31 np0005538338.novalocal kernel: tap15422770-f0: entered promiscuous mode Nov 27 19:38:31 np0005538338.novalocal sudo[99050]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-15422770-f91d-45fd-af8b-5cb3997797fd env PROCESS_TAG=haproxy-15422770-f91d-45fd-af8b-5cb3997797fd haproxy -f /var/lib/neutron/ovn-metadata-proxy/15422770-f91d-45fd-af8b-5cb3997797fd.conf Nov 27 19:38:31 np0005538338.novalocal systemd[1]: Started Session c302 of User root. Nov 27 19:38:31 np0005538338.novalocal sudo[99050]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:38:31 np0005538338.novalocal sudo[99043]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:31 np0005538338.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Nov 27 19:38:31 np0005538338.novalocal sudo[99056]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6099473e-e4d4-4caa-85f2-44ef417117d9 Nov 27 19:38:31 np0005538338.novalocal sudo[99050]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:31 np0005538338.novalocal systemd[1]: Started Session c303 of User root. Nov 27 19:38:31 np0005538338.novalocal sudo[99056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:32 np0005538338.novalocal sudo[99056]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:32 np0005538338.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Nov 27 19:38:32 np0005538338.novalocal sudo[99068]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6099473e-e4d4-4caa-85f2-44ef417117d9 Nov 27 19:38:32 np0005538338.novalocal systemd[1]: Started Session c304 of User root. Nov 27 19:38:32 np0005538338.novalocal sudo[99068]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:32 np0005538338.novalocal lvm[99073]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:32 np0005538338.novalocal lvm[99073]: VG cinder-volumes finished Nov 27 19:38:32 np0005538338.novalocal sudo[99068]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:32 np0005538338.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Nov 27 19:38:32 np0005538338.novalocal sudo[99074]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:38:32 np0005538338.novalocal systemd[1]: Started Session c305 of User root. Nov 27 19:38:32 np0005538338.novalocal sudo[99074]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:33 np0005538338.novalocal sudo[99074]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:33 np0005538338.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Nov 27 19:38:33 np0005538338.novalocal sudo[99078]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:33 np0005538338.novalocal systemd[1]: Started Session c306 of User root. Nov 27 19:38:33 np0005538338.novalocal sudo[99078]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:33 np0005538338.novalocal sudo[99078]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:33 np0005538338.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Nov 27 19:38:33 np0005538338.novalocal sudo[99083]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:38:33 np0005538338.novalocal systemd[1]: Started Session c307 of User root. Nov 27 19:38:33 np0005538338.novalocal sudo[99085]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-bd793f78-a662-4cae-b02c-89b266fcd06e Nov 27 19:38:33 np0005538338.novalocal sudo[99083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:33 np0005538338.novalocal systemd[1]: Started Session c308 of User root. Nov 27 19:38:33 np0005538338.novalocal sudo[99085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:33 np0005538338.novalocal sudo[99083]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:33 np0005538338.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Nov 27 19:38:34 np0005538338.novalocal sudo[99096]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:34 np0005538338.novalocal systemd[1]: Started Session c309 of User root. Nov 27 19:38:34 np0005538338.novalocal sudo[99096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:34 np0005538338.novalocal sudo[99085]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:34 np0005538338.novalocal systemd[1]: session-c308.scope: Deactivated successfully. Nov 27 19:38:34 np0005538338.novalocal sudo[99099]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-bd793f78-a662-4cae-b02c-89b266fcd06e Nov 27 19:38:34 np0005538338.novalocal systemd[1]: Started Session c310 of User root. Nov 27 19:38:34 np0005538338.novalocal sudo[99099]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:34 np0005538338.novalocal sudo[99096]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:34 np0005538338.novalocal systemd[1]: session-c309.scope: Deactivated successfully. Nov 27 19:38:34 np0005538338.novalocal sudo[99099]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:34 np0005538338.novalocal systemd[1]: session-c310.scope: Deactivated successfully. Nov 27 19:38:34 np0005538338.novalocal sudo[99104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-bd793f78-a662-4cae-b02c-89b266fcd06e Nov 27 19:38:34 np0005538338.novalocal systemd[1]: Started Session c311 of User root. Nov 27 19:38:34 np0005538338.novalocal sudo[99104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:34 np0005538338.novalocal lvm[99111]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:34 np0005538338.novalocal lvm[99111]: VG cinder-volumes finished Nov 27 19:38:35 np0005538338.novalocal sudo[99104]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:35 np0005538338.novalocal systemd[1]: session-c311.scope: Deactivated successfully. Nov 27 19:38:35 np0005538338.novalocal sudo[99112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:38:35 np0005538338.novalocal systemd[1]: Started Session c312 of User root. Nov 27 19:38:35 np0005538338.novalocal sudo[99112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:35 np0005538338.novalocal sudo[99112]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:35 np0005538338.novalocal systemd[1]: session-c312.scope: Deactivated successfully. Nov 27 19:38:35 np0005538338.novalocal sudo[99116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:35 np0005538338.novalocal systemd[1]: Started Session c313 of User root. Nov 27 19:38:35 np0005538338.novalocal sudo[99116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:35 np0005538338.novalocal sudo[99119]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-c480f9ae-3058-45d7-95da-d0f6fc41e60b Nov 27 19:38:35 np0005538338.novalocal systemd[1]: Started Session c314 of User root. Nov 27 19:38:35 np0005538338.novalocal sudo[99119]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:35 np0005538338.novalocal sudo[99116]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:36 np0005538338.novalocal systemd[1]: session-c313.scope: Deactivated successfully. Nov 27 19:38:36 np0005538338.novalocal sudo[99123]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:38:36 np0005538338.novalocal systemd[1]: Started Session c315 of User root. Nov 27 19:38:36 np0005538338.novalocal sudo[99123]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:36 np0005538338.novalocal sudo[99119]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:36 np0005538338.novalocal systemd[1]: session-c314.scope: Deactivated successfully. Nov 27 19:38:36 np0005538338.novalocal sudo[99127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-c480f9ae-3058-45d7-95da-d0f6fc41e60b Nov 27 19:38:36 np0005538338.novalocal systemd[1]: Started Session c316 of User root. Nov 27 19:38:36 np0005538338.novalocal sudo[99127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:36 np0005538338.novalocal sudo[99123]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:36 np0005538338.novalocal systemd[1]: session-c315.scope: Deactivated successfully. Nov 27 19:38:36 np0005538338.novalocal sudo[99131]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:36 np0005538338.novalocal systemd[1]: Started Session c317 of User root. Nov 27 19:38:36 np0005538338.novalocal sudo[99131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:36 np0005538338.novalocal sudo[99127]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:36 np0005538338.novalocal systemd[1]: session-c316.scope: Deactivated successfully. Nov 27 19:38:36 np0005538338.novalocal sudo[99135]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-c480f9ae-3058-45d7-95da-d0f6fc41e60b Nov 27 19:38:36 np0005538338.novalocal systemd[1]: Started Session c318 of User root. Nov 27 19:38:36 np0005538338.novalocal sudo[99135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:36 np0005538338.novalocal sudo[99131]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:36 np0005538338.novalocal systemd[1]: session-c317.scope: Deactivated successfully. Nov 27 19:38:37 np0005538338.novalocal lvm[99143]: PV /dev/loop2 online, VG cinder-volumes is complete. Nov 27 19:38:37 np0005538338.novalocal lvm[99143]: VG cinder-volumes finished Nov 27 19:38:37 np0005538338.novalocal sudo[99135]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:37 np0005538338.novalocal systemd[1]: session-c318.scope: Deactivated successfully. Nov 27 19:38:37 np0005538338.novalocal sudo[99145]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:38:37 np0005538338.novalocal systemd[1]: Started Session c319 of User root. Nov 27 19:38:37 np0005538338.novalocal sudo[99145]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:38 np0005538338.novalocal sudo[99145]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:38 np0005538338.novalocal systemd[1]: session-c319.scope: Deactivated successfully. Nov 27 19:38:38 np0005538338.novalocal sudo[99151]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:38 np0005538338.novalocal systemd[1]: Started Session c320 of User root. Nov 27 19:38:38 np0005538338.novalocal sudo[99151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:38 np0005538338.novalocal sudo[99151]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:38 np0005538338.novalocal systemd[1]: session-c320.scope: Deactivated successfully. Nov 27 19:38:38 np0005538338.novalocal sudo[99167]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:38:38 np0005538338.novalocal systemd[1]: Started Session c321 of User root. Nov 27 19:38:38 np0005538338.novalocal sudo[99167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:38 np0005538338.novalocal sudo[99167]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:38 np0005538338.novalocal systemd[1]: session-c321.scope: Deactivated successfully. Nov 27 19:38:38 np0005538338.novalocal sudo[99176]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:38:38 np0005538338.novalocal systemd[1]: Started Session c322 of User root. Nov 27 19:38:38 np0005538338.novalocal sudo[99176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:38:39 np0005538338.novalocal sudo[99176]: pam_unix(sudo:session): session closed for user root Nov 27 19:38:39 np0005538338.novalocal systemd[1]: session-c322.scope: Deactivated successfully. Nov 27 19:38:45 np0005538338.novalocal haproxy-metadata-proxy-15422770-f91d-45fd-af8b-5cb3997797fd[99057]: 10.100.0.10:54776 [27/Nov/2025:19:38:45.331] listener listener/metadata 0/0/0/359/359 200 131 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:38:46 np0005538338.novalocal haproxy-metadata-proxy-15422770-f91d-45fd-af8b-5cb3997797fd[99057]: 10.100.0.10:54778 [27/Nov/2025:19:38:45.885] listener listener/metadata 0/0/0/1099/1099 200 118 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Nov 27 19:38:49 np0005538338.novalocal kernel: tapda9f07b3-bd (unregistering): left promiscuous mode Nov 27 19:38:49 np0005538338.novalocal NetworkManager[858]: [1764290329.1646] device (tapda9f07b3-bd): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:38:49 np0005538338.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Nov 27 19:38:49 np0005538338.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 14.400s CPU time. Nov 27 19:38:49 np0005538338.novalocal systemd-machined[90535]: Machine qemu-9-instance-00000008 terminated. Nov 27 19:38:49 np0005538338.novalocal kernel: tap15422770-f0: left promiscuous mode Nov 27 19:38:49 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d15422770\x2df91d\x2d45fd\x2daf8b\x2d5cb3997797fd.mount: Deactivated successfully. Nov 27 19:38:49 np0005538338.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Nov 27 19:38:54 np0005538338.novalocal kernel: tap2a5626f6-2e: entered promiscuous mode Nov 27 19:38:54 np0005538338.novalocal NetworkManager[858]: [1764290334.0314] manager: (tap2a5626f6-2e): new Tun device (/org/freedesktop/NetworkManager/Devices/29) Nov 27 19:38:54 np0005538338.novalocal virtqemud[93072]: Domain id=10 name='instance-00000009' uuid=703f5cc3-c6a9-4287-9008-72432d4c6be5 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:38:54 np0005538338.novalocal virtqemud[93072]: Domain id=10 name='instance-00000009' uuid=703f5cc3-c6a9-4287-9008-72432d4c6be5 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:38:54 np0005538338.novalocal systemd-machined[90535]: New machine qemu-10-instance-00000009. Nov 27 19:38:54 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Nov 27 19:38:54 np0005538338.novalocal systemd-udevd[99282]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:38:54 np0005538338.novalocal NetworkManager[858]: [1764290334.1322] manager: (tap38948c76-20): new Veth device (/org/freedesktop/NetworkManager/Devices/30) Nov 27 19:38:54 np0005538338.novalocal systemd-udevd[99284]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:38:54 np0005538338.novalocal NetworkManager[858]: [1764290334.1411] device (tap2a5626f6-2e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:38:54 np0005538338.novalocal NetworkManager[858]: [1764290334.1421] device (tap2a5626f6-2e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:38:54 np0005538338.novalocal NetworkManager[858]: [1764290334.1856] device (tap38948c76-20): carrier: link connected Nov 27 19:38:54 np0005538338.novalocal kernel: tap38948c76-20: entered promiscuous mode Nov 27 19:38:54 np0005538338.novalocal sudo[99323]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-38948c76-20f5-4571-b25b-1073ff479d37 env PROCESS_TAG=haproxy-38948c76-20f5-4571-b25b-1073ff479d37 haproxy -f /var/lib/neutron/ovn-metadata-proxy/38948c76-20f5-4571-b25b-1073ff479d37.conf Nov 27 19:38:54 np0005538338.novalocal systemd[1]: Started Session c323 of User root. Nov 27 19:38:54 np0005538338.novalocal sudo[99323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Nov 27 19:38:54 np0005538338.novalocal sudo[99323]: pam_unix(sudo:session): session closed for user root Nov 27 19:39:02 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35736 [27/Nov/2025:19:39:02.630] listener listener/metadata 0/0/0/149/149 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:39:02 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:39:02 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:39:02 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35738 [27/Nov/2025:19:39:02.886] listener listener/metadata 0/0/0/208/208 200 159 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35740 [27/Nov/2025:19:39:03.142] listener listener/metadata 0/0/0/12/12 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35742 [27/Nov/2025:19:39:03.201] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35744 [27/Nov/2025:19:39:03.261] listener listener/metadata 0/0/0/45/45 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35746 [27/Nov/2025:19:39:03.357] listener listener/metadata 0/0/0/19/19 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35748 [27/Nov/2025:19:39:03.428] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35750 [27/Nov/2025:19:39:03.489] listener listener/metadata 0/0/0/15/15 200 119 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35752 [27/Nov/2025:19:39:03.546] listener listener/metadata 0/0/0/14/14 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35754 [27/Nov/2025:19:39:03.609] listener listener/metadata 0/0/0/11/11 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35756 [27/Nov/2025:19:39:03.673] listener listener/metadata 0/0/0/18/18 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35758 [27/Nov/2025:19:39:03.752] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35760 [27/Nov/2025:19:39:03.806] listener listener/metadata 0/0/0/16/16 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35762 [27/Nov/2025:19:39:03.853] listener listener/metadata 0/0/0/10/10 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35764 [27/Nov/2025:19:39:03.899] listener listener/metadata 0/0/0/18/18 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Nov 27 19:39:03 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.11:35766 [27/Nov/2025:19:39:03.955] listener listener/metadata 0/0/0/9/9 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Nov 27 19:39:14 np0005538338.novalocal kernel: tap64343fc4-28: entered promiscuous mode Nov 27 19:39:14 np0005538338.novalocal NetworkManager[858]: [1764290354.3504] manager: (tap64343fc4-28): new Tun device (/org/freedesktop/NetworkManager/Devices/31) Nov 27 19:39:14 np0005538338.novalocal virtqemud[93072]: Domain id=11 name='instance-0000000a' uuid=5a6a306c-9a2b-401a-9fba-06128d00b946 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Nov 27 19:39:14 np0005538338.novalocal virtqemud[93072]: Domain id=11 name='instance-0000000a' uuid=5a6a306c-9a2b-401a-9fba-06128d00b946 is tainted: deprecated-config (CPU model 'qemu64') Nov 27 19:39:14 np0005538338.novalocal systemd-machined[90535]: New machine qemu-11-instance-0000000a. Nov 27 19:39:14 np0005538338.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Nov 27 19:39:14 np0005538338.novalocal systemd-udevd[99422]: Network interface NamePolicy= disabled on kernel command line. Nov 27 19:39:14 np0005538338.novalocal NetworkManager[858]: [1764290354.4575] device (tap64343fc4-28): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Nov 27 19:39:14 np0005538338.novalocal NetworkManager[858]: [1764290354.4583] device (tap64343fc4-28): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42980 [27/Nov/2025:19:39:23.067] listener listener/metadata 0/0/0/117/117 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42982 [27/Nov/2025:19:39:23.260] listener listener/metadata 0/0/0/174/174 200 159 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42984 [27/Nov/2025:19:39:23.497] listener listener/metadata 0/0/0/15/15 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42986 [27/Nov/2025:19:39:23.557] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42988 [27/Nov/2025:19:39:23.617] listener listener/metadata 0/0/0/12/12 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42990 [27/Nov/2025:19:39:23.703] listener listener/metadata 0/0/0/8/8 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42992 [27/Nov/2025:19:39:23.764] listener listener/metadata 0/0/0/9/9 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42994 [27/Nov/2025:19:39:23.842] listener listener/metadata 0/0/0/11/11 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42996 [27/Nov/2025:19:39:23.894] listener listener/metadata 0/0/0/10/10 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Nov 27 19:39:23 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:42998 [27/Nov/2025:19:39:23.944] listener listener/metadata 0/0/0/10/10 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43000 [27/Nov/2025:19:39:23.998] listener listener/metadata 0/0/0/8/8 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43002 [27/Nov/2025:19:39:24.051] listener listener/metadata 0/0/0/11/11 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43004 [27/Nov/2025:19:39:24.092] listener listener/metadata 0/0/0/12/12 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43006 [27/Nov/2025:19:39:24.147] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43008 [27/Nov/2025:19:39:24.220] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Nov 27 19:39:24 np0005538338.novalocal haproxy-metadata-proxy-38948c76-20f5-4571-b25b-1073ff479d37[99329]: 10.100.0.7:43010 [27/Nov/2025:19:39:24.283] listener listener/metadata 0/0/0/13/13 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Nov 27 19:39:29 np0005538338.novalocal sudo[99498]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:39:29 np0005538338.novalocal systemd[1]: Started Session c324 of User root. Nov 27 19:39:29 np0005538338.novalocal sudo[99498]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:39:29 np0005538338.novalocal sudo[99498]: pam_unix(sudo:session): session closed for user root Nov 27 19:39:29 np0005538338.novalocal systemd[1]: session-c324.scope: Deactivated successfully. Nov 27 19:39:29 np0005538338.novalocal sudo[99502]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:39:29 np0005538338.novalocal systemd[1]: Started Session c325 of User root. Nov 27 19:39:29 np0005538338.novalocal sudo[99502]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:39:29 np0005538338.novalocal sudo[99502]: pam_unix(sudo:session): session closed for user root Nov 27 19:39:29 np0005538338.novalocal systemd[1]: session-c325.scope: Deactivated successfully. Nov 27 19:39:29 np0005538338.novalocal sudo[99506]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:39:30 np0005538338.novalocal systemd[1]: Started Session c326 of User root. Nov 27 19:39:30 np0005538338.novalocal sudo[99506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:39:30 np0005538338.novalocal sudo[99506]: pam_unix(sudo:session): session closed for user root Nov 27 19:39:30 np0005538338.novalocal systemd[1]: session-c326.scope: Deactivated successfully. Nov 27 19:39:30 np0005538338.novalocal sudo[99546]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:39:30 np0005538338.novalocal systemd[1]: Started Session c327 of User root. Nov 27 19:39:30 np0005538338.novalocal sudo[99546]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:39:30 np0005538338.novalocal kernel: tap64343fc4-28 (unregistering): left promiscuous mode Nov 27 19:39:30 np0005538338.novalocal NetworkManager[858]: [1764290370.6338] device (tap64343fc4-28): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:39:30 np0005538338.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Nov 27 19:39:30 np0005538338.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 14.368s CPU time. Nov 27 19:39:30 np0005538338.novalocal systemd-machined[90535]: Machine qemu-11-instance-0000000a terminated. Nov 27 19:39:30 np0005538338.novalocal sudo[99546]: pam_unix(sudo:session): session closed for user root Nov 27 19:39:30 np0005538338.novalocal systemd[1]: session-c327.scope: Deactivated successfully. Nov 27 19:39:41 np0005538338.novalocal kernel: tap2a5626f6-2e (unregistering): left promiscuous mode Nov 27 19:39:41 np0005538338.novalocal NetworkManager[858]: [1764290381.5454] device (tap2a5626f6-2e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Nov 27 19:39:41 np0005538338.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Nov 27 19:39:41 np0005538338.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 14.937s CPU time. Nov 27 19:39:41 np0005538338.novalocal systemd-machined[90535]: Machine qemu-10-instance-00000009 terminated. Nov 27 19:39:41 np0005538338.novalocal kernel: tap38948c76-20: left promiscuous mode Nov 27 19:39:41 np0005538338.novalocal systemd[1]: session-c323.scope: Deactivated successfully. Nov 27 19:39:41 np0005538338.novalocal systemd[1]: run-netns-ovnmeta\x2d38948c76\x2d20f5\x2d4571\x2db25b\x2d1073ff479d37.mount: Deactivated successfully. Nov 27 19:39:41 np0005538338.novalocal NetworkManager[858]: [1764290381.7590] manager: (tap2a5626f6-2e): new Tun device (/org/freedesktop/NetworkManager/Devices/32) Nov 27 19:39:44 np0005538338.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 27 19:39:45 np0005538338.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 27 19:39:46 np0005538338.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service. Nov 27 19:39:47 np0005538338.novalocal setroubleshoot[99630]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 734c82c4-4f71-4f10-9a32-e506b6d5ee06 Nov 27 19:39:47 np0005538338.novalocal setroubleshoot[99630]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:39:47 np0005538338.novalocal setroubleshoot[99630]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 734c82c4-4f71-4f10-9a32-e506b6d5ee06 Nov 27 19:39:47 np0005538338.novalocal setroubleshoot[99630]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Nov 27 19:39:49 np0005538338.novalocal octavia-worker[93516]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:project-reader". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Nov 27 19:39:49 np0005538338.novalocal octavia-worker[93516]: warnings.warn(deprecated_msg) Nov 27 19:39:49 np0005538338.novalocal octavia-worker[93516]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:member_and_owner":"role:load-balancer_member and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:member_and_owner":"role:load-balancer_member and rule:project-member". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Nov 27 19:39:49 np0005538338.novalocal octavia-worker[93516]: warnings.warn(deprecated_msg) Nov 27 19:39:58 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service: Deactivated successfully. Nov 27 19:39:58 np0005538338.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service: Consumed 1.217s CPU time. Nov 27 19:39:58 np0005538338.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 27 19:39:58 np0005538338.novalocal systemd[1]: setroubleshootd.service: Consumed 1.357s CPU time. Nov 27 19:40:07 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:40:07 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:40:07 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:40:29 np0005538338.novalocal sudo[99690]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:40:29 np0005538338.novalocal systemd[1]: Started Session c328 of User root. Nov 27 19:40:29 np0005538338.novalocal sudo[99690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:40:29 np0005538338.novalocal sudo[99690]: pam_unix(sudo:session): session closed for user root Nov 27 19:40:29 np0005538338.novalocal systemd[1]: session-c328.scope: Deactivated successfully. Nov 27 19:40:29 np0005538338.novalocal sudo[99694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:40:29 np0005538338.novalocal systemd[1]: Started Session c329 of User root. Nov 27 19:40:29 np0005538338.novalocal sudo[99694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:40:29 np0005538338.novalocal sudo[99694]: pam_unix(sudo:session): session closed for user root Nov 27 19:40:29 np0005538338.novalocal systemd[1]: session-c329.scope: Deactivated successfully. Nov 27 19:40:29 np0005538338.novalocal sudo[99698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:40:29 np0005538338.novalocal systemd[1]: Started Session c330 of User root. Nov 27 19:40:29 np0005538338.novalocal sudo[99698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:40:30 np0005538338.novalocal sudo[99698]: pam_unix(sudo:session): session closed for user root Nov 27 19:40:30 np0005538338.novalocal systemd[1]: session-c330.scope: Deactivated successfully. Nov 27 19:40:30 np0005538338.novalocal sudo[99702]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:40:30 np0005538338.novalocal systemd[1]: Started Session c331 of User root. Nov 27 19:40:30 np0005538338.novalocal sudo[99702]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:40:30 np0005538338.novalocal sudo[99702]: pam_unix(sudo:session): session closed for user root Nov 27 19:40:30 np0005538338.novalocal systemd[1]: session-c331.scope: Deactivated successfully. Nov 27 19:41:03 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:41:03 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:41:03 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:41:29 np0005538338.novalocal sudo[99768]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:41:29 np0005538338.novalocal systemd[1]: Started Session c332 of User root. Nov 27 19:41:29 np0005538338.novalocal sudo[99768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:41:29 np0005538338.novalocal sudo[99768]: pam_unix(sudo:session): session closed for user root Nov 27 19:41:29 np0005538338.novalocal systemd[1]: session-c332.scope: Deactivated successfully. Nov 27 19:41:29 np0005538338.novalocal sudo[99772]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:41:29 np0005538338.novalocal systemd[1]: Started Session c333 of User root. Nov 27 19:41:29 np0005538338.novalocal sudo[99772]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:41:29 np0005538338.novalocal sudo[99772]: pam_unix(sudo:session): session closed for user root Nov 27 19:41:29 np0005538338.novalocal systemd[1]: session-c333.scope: Deactivated successfully. Nov 27 19:41:29 np0005538338.novalocal sudo[99776]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:41:29 np0005538338.novalocal systemd[1]: Started Session c334 of User root. Nov 27 19:41:29 np0005538338.novalocal sudo[99776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:41:30 np0005538338.novalocal sudo[99776]: pam_unix(sudo:session): session closed for user root Nov 27 19:41:30 np0005538338.novalocal systemd[1]: session-c334.scope: Deactivated successfully. Nov 27 19:41:30 np0005538338.novalocal sudo[99780]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:41:30 np0005538338.novalocal systemd[1]: Started Session c335 of User root. Nov 27 19:41:30 np0005538338.novalocal sudo[99780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:41:30 np0005538338.novalocal sudo[99780]: pam_unix(sudo:session): session closed for user root Nov 27 19:41:30 np0005538338.novalocal systemd[1]: session-c335.scope: Deactivated successfully. Nov 27 19:42:01 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:42:01 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:42:01 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:42:29 np0005538338.novalocal sudo[99845]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:42:29 np0005538338.novalocal systemd[1]: Started Session c336 of User root. Nov 27 19:42:29 np0005538338.novalocal sudo[99845]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:42:29 np0005538338.novalocal sudo[99845]: pam_unix(sudo:session): session closed for user root Nov 27 19:42:29 np0005538338.novalocal systemd[1]: session-c336.scope: Deactivated successfully. Nov 27 19:42:29 np0005538338.novalocal sudo[99849]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:42:29 np0005538338.novalocal systemd[1]: Started Session c337 of User root. Nov 27 19:42:29 np0005538338.novalocal sudo[99849]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:42:29 np0005538338.novalocal sudo[99849]: pam_unix(sudo:session): session closed for user root Nov 27 19:42:29 np0005538338.novalocal systemd[1]: session-c337.scope: Deactivated successfully. Nov 27 19:42:29 np0005538338.novalocal sudo[99853]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:42:29 np0005538338.novalocal systemd[1]: Started Session c338 of User root. Nov 27 19:42:29 np0005538338.novalocal sudo[99853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:42:30 np0005538338.novalocal sudo[99853]: pam_unix(sudo:session): session closed for user root Nov 27 19:42:30 np0005538338.novalocal systemd[1]: session-c338.scope: Deactivated successfully. Nov 27 19:42:30 np0005538338.novalocal sudo[99857]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:42:30 np0005538338.novalocal systemd[1]: Started Session c339 of User root. Nov 27 19:42:30 np0005538338.novalocal sudo[99857]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:42:30 np0005538338.novalocal sudo[99857]: pam_unix(sudo:session): session closed for user root Nov 27 19:42:30 np0005538338.novalocal systemd[1]: session-c339.scope: Deactivated successfully. Nov 27 19:43:03 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:43:03 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:43:03 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:43:29 np0005538338.novalocal sudo[99925]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:43:29 np0005538338.novalocal systemd[1]: Started Session c340 of User root. Nov 27 19:43:29 np0005538338.novalocal sudo[99925]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:43:29 np0005538338.novalocal sudo[99925]: pam_unix(sudo:session): session closed for user root Nov 27 19:43:29 np0005538338.novalocal systemd[1]: session-c340.scope: Deactivated successfully. Nov 27 19:43:29 np0005538338.novalocal sudo[99929]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:43:29 np0005538338.novalocal systemd[1]: Started Session c341 of User root. Nov 27 19:43:29 np0005538338.novalocal sudo[99929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:43:29 np0005538338.novalocal sudo[99929]: pam_unix(sudo:session): session closed for user root Nov 27 19:43:29 np0005538338.novalocal systemd[1]: session-c341.scope: Deactivated successfully. Nov 27 19:43:29 np0005538338.novalocal sudo[99933]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:43:29 np0005538338.novalocal systemd[1]: Started Session c342 of User root. Nov 27 19:43:29 np0005538338.novalocal sudo[99933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:43:30 np0005538338.novalocal sudo[99933]: pam_unix(sudo:session): session closed for user root Nov 27 19:43:30 np0005538338.novalocal systemd[1]: session-c342.scope: Deactivated successfully. Nov 27 19:43:30 np0005538338.novalocal sudo[99937]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:43:30 np0005538338.novalocal systemd[1]: Started Session c343 of User root. Nov 27 19:43:30 np0005538338.novalocal sudo[99937]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:43:30 np0005538338.novalocal sudo[99937]: pam_unix(sudo:session): session closed for user root Nov 27 19:43:30 np0005538338.novalocal systemd[1]: session-c343.scope: Deactivated successfully. Nov 27 19:43:58 np0005538338.novalocal octavia-worker[93513]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:project-reader". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Nov 27 19:43:58 np0005538338.novalocal octavia-worker[93513]: warnings.warn(deprecated_msg) Nov 27 19:43:58 np0005538338.novalocal octavia-worker[93513]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:member_and_owner":"role:load-balancer_member and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:member_and_owner":"role:load-balancer_member and rule:project-member". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Nov 27 19:43:58 np0005538338.novalocal octavia-worker[93513]: warnings.warn(deprecated_msg) Nov 27 19:44:03 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:44:03 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:44:03 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:44:29 np0005538338.novalocal sudo[100002]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:44:29 np0005538338.novalocal systemd[1]: Started Session c344 of User root. Nov 27 19:44:29 np0005538338.novalocal sudo[100002]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:44:29 np0005538338.novalocal sudo[100002]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:29 np0005538338.novalocal systemd[1]: session-c344.scope: Deactivated successfully. Nov 27 19:44:29 np0005538338.novalocal sudo[100006]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:44:29 np0005538338.novalocal systemd[1]: Started Session c345 of User root. Nov 27 19:44:29 np0005538338.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:44:29 np0005538338.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:29 np0005538338.novalocal systemd[1]: session-c345.scope: Deactivated successfully. Nov 27 19:44:29 np0005538338.novalocal sudo[100010]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:44:29 np0005538338.novalocal systemd[1]: Started Session c346 of User root. Nov 27 19:44:29 np0005538338.novalocal sudo[100010]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:44:30 np0005538338.novalocal sudo[100010]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:30 np0005538338.novalocal systemd[1]: session-c346.scope: Deactivated successfully. Nov 27 19:44:30 np0005538338.novalocal sudo[100014]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:44:30 np0005538338.novalocal systemd[1]: Started Session c347 of User root. Nov 27 19:44:30 np0005538338.novalocal sudo[100014]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:44:30 np0005538338.novalocal sudo[100014]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:30 np0005538338.novalocal systemd[1]: session-c347.scope: Deactivated successfully. Nov 27 19:44:32 np0005538338.novalocal lvm[100067]: PV /dev/loop3 online, VG lvm-shares is complete. Nov 27 19:44:32 np0005538338.novalocal lvm[100067]: VG lvm-shares finished Nov 27 19:44:32 np0005538338.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 01fb60a9-6ac5-446e-a336-07939fe6f0f8 r/w with ordered data mode. Quota mode: none. Nov 27 19:44:35 np0005538338.novalocal systemd[1]: var-lib-manila-mnt-share\x2d4a287fa0\x2df897\x2d4037\x2da776\x2d426bdf99d91d.mount: Deactivated successfully. Nov 27 19:44:35 np0005538338.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 01fb60a9-6ac5-446e-a336-07939fe6f0f8. Nov 27 19:44:35 np0005538338.novalocal lvm[100083]: PV /dev/loop3 online, VG lvm-shares is complete. Nov 27 19:44:35 np0005538338.novalocal lvm[100083]: VG lvm-shares finished Nov 27 19:44:45 np0005538338.novalocal sudo[54786]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:46 np0005538338.novalocal sudo[100757]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-raofjyzlwmjrtfrelmpwzdrkmdnpyoom ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Nov 27 19:44:46 np0005538338.novalocal sudo[100757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:44:46 np0005538338.novalocal python3[100759]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Nov 27 19:44:47 np0005538338.novalocal sudo[100881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100881]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100884]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100887]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100887]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100890]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100890]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100893]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100893]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100896]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100896]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100899]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100902]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100905]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100908]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100911]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100911]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100914]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100914]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100917]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100917]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100920]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100923]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100926]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100929]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100934]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100934]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100937]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100937]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100940]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Nov 27 19:44:47 np0005538338.novalocal sudo[100940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100940]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100943]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Nov 27 19:44:47 np0005538338.novalocal sudo[100943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100943]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100946]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Nov 27 19:44:47 np0005538338.novalocal sudo[100946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100946]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:47 np0005538338.novalocal sudo[100950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Nov 27 19:44:47 np0005538338.novalocal sudo[100950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:47 np0005538338.novalocal sudo[100950]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Nov 27 19:44:48 np0005538338.novalocal sudo[100954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100954]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[100957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100957]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Nov 27 19:44:48 np0005538338.novalocal sudo[100960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100960]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[100963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100963]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[100966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100966]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100969]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100975]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Nov 27 19:44:48 np0005538338.novalocal sudo[100978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100978]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Nov 27 19:44:48 np0005538338.novalocal sudo[100981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100981]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100984]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100987]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100990]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[100993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[100993]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[100996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Nov 27 19:44:48 np0005538338.novalocal sudo[100996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal virtqemud[93072]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Nov 27 19:44:48 np0005538338.novalocal sudo[100996]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[101000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101000]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Nov 27 19:44:48 np0005538338.novalocal sudo[101003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101003]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Nov 27 19:44:48 np0005538338.novalocal sudo[101006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101006]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101010]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Nov 27 19:44:48 np0005538338.novalocal sudo[101010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101010]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101013]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Nov 27 19:44:48 np0005538338.novalocal sudo[101013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101013]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101016]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Nov 27 19:44:48 np0005538338.novalocal sudo[101016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101016]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101019]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Nov 27 19:44:48 np0005538338.novalocal sudo[101019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101019]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:48 np0005538338.novalocal sudo[101022]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Nov 27 19:44:48 np0005538338.novalocal sudo[101022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:48 np0005538338.novalocal sudo[101022]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101025]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Nov 27 19:44:49 np0005538338.novalocal sudo[101025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101025]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Nov 27 19:44:49 np0005538338.novalocal sudo[101029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101029]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Nov 27 19:44:49 np0005538338.novalocal sudo[101033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101033]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Nov 27 19:44:49 np0005538338.novalocal sudo[101036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101036]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101039]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101043]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Nov 27 19:44:49 np0005538338.novalocal sudo[101043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101043]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Nov 27 19:44:49 np0005538338.novalocal sudo[101047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101047]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/access_compat.load /etc/httpd/conf.modules.d/actions.load /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/auth_basic.load /etc/httpd/conf.modules.d/auth_digest.load /etc/httpd/conf.modules.d/authn_anon.load /etc/httpd/conf.modules.d/authn_core.load /etc/httpd/conf.modules.d/authn_dbm.load /etc/httpd/conf.modules.d/authn_file.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_dbm.load /etc/httpd/conf.modules.d/authz_groupfile.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/authz_owner.load /etc/httpd/conf.modules.d/authz_user.load /etc/httpd/conf.modules.d/autoindex.conf /etc/httpd/conf.modules.d/autoindex.load /etc/httpd/conf.modules.d/cache.load /etc/httpd/conf.modules.d/cgi.load /etc/httpd/conf.modules.d/dav_fs.conf /etc/httpd/conf.modules.d/dav_fs.load Nov 27 19:44:49 np0005538338.novalocal sudo[101051]: root : (command continued) /etc/httpd/conf.modules.d/dav.load /etc/httpd/conf.modules.d/deflate.conf /etc/httpd/conf.modules.d/deflate.load /etc/httpd/conf.modules.d/dir.conf /etc/httpd/conf.modules.d/dir.load /etc/httpd/conf.modules.d/env.load /etc/httpd/conf.modules.d/expires.load /etc/httpd/conf.modules.d/ext_filter.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/include.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/logio.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/mime_magic.conf /etc/httpd/conf.modules.d/mime_magic.load /etc/httpd/conf.modules.d/negotiation.conf /etc/httpd/conf.modules.d/negotiation.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/rewrite.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load Nov 27 19:44:49 np0005538338.novalocal sudo[101051]: root : (command continued) /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/speling.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/substitute.load /etc/httpd/conf.modules.d/suexec.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/usertrack.load /etc/httpd/conf.modules.d/version.load /etc/httpd/conf.modules.d/vhost_alias.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Nov 27 19:44:49 np0005538338.novalocal sudo[101051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101051]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Nov 27 19:44:49 np0005538338.novalocal sudo[101054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101054]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101057]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Nov 27 19:44:49 np0005538338.novalocal sudo[101060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101060]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101063]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Nov 27 19:44:49 np0005538338.novalocal sudo[101066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101066]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101070]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101073]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101076]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101079]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101079]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101082]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101082]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101085]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101085]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101088]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101091]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101094]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101097]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:49 np0005538338.novalocal sudo[101100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Nov 27 19:44:49 np0005538338.novalocal sudo[101100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:49 np0005538338.novalocal sudo[101100]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:50 np0005538338.novalocal sudo[101109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Nov 27 19:44:50 np0005538338.novalocal sudo[101109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:51 np0005538338.novalocal sudo[101109]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:51 np0005538338.novalocal sudo[101112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Nov 27 19:44:51 np0005538338.novalocal sudo[101112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:52 np0005538338.novalocal sudo[101112]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:52 np0005538338.novalocal sudo[101115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Nov 27 19:44:52 np0005538338.novalocal sudo[101115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:52 np0005538338.novalocal sudo[101115]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:52 np0005538338.novalocal sudo[101119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Nov 27 19:44:52 np0005538338.novalocal sudo[101119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:52 np0005538338.novalocal sudo[101119]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:52 np0005538338.novalocal sudo[101123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Nov 27 19:44:52 np0005538338.novalocal sudo[101123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101123]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Nov 27 19:44:53 np0005538338.novalocal sudo[101126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101126]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Nov 27 19:44:53 np0005538338.novalocal sudo[101132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101132]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Nov 27 19:44:53 np0005538338.novalocal sudo[101135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101135]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /root/openrc /var/log/weirdo-project/logs/openrc.txt Nov 27 19:44:53 np0005538338.novalocal sudo[101138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101138]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/openrc.txt Nov 27 19:44:53 np0005538338.novalocal sudo[101141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101141]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Nov 27 19:44:53 np0005538338.novalocal sudo[101144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101144]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Nov 27 19:44:53 np0005538338.novalocal sudo[101147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101147]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Nov 27 19:44:53 np0005538338.novalocal sudo[101154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101154]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Nov 27 19:44:53 np0005538338.novalocal sudo[101157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101157]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Nov 27 19:44:53 np0005538338.novalocal sudo[101163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101163]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Nov 27 19:44:53 np0005538338.novalocal sudo[101166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101166]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Nov 27 19:44:53 np0005538338.novalocal sudo[101169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:53 np0005538338.novalocal sudo[101169]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:53 np0005538338.novalocal sudo[101172]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Nov 27 19:44:53 np0005538338.novalocal sudo[101172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101172]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Nov 27 19:44:55 np0005538338.novalocal sudo[101175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101175]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Nov 27 19:44:55 np0005538338.novalocal sudo[101178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101178]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Nov 27 19:44:55 np0005538338.novalocal sudo[101181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101181]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Nov 27 19:44:55 np0005538338.novalocal sudo[101184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101184]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Nov 27 19:44:55 np0005538338.novalocal sudo[101187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101187]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Nov 27 19:44:55 np0005538338.novalocal sudo[101190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101190]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:55 np0005538338.novalocal sudo[101193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Nov 27 19:44:55 np0005538338.novalocal sudo[101193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:55 np0005538338.novalocal sudo[101193]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:56 np0005538338.novalocal sudo[101196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Nov 27 19:44:56 np0005538338.novalocal sudo[101196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:56 np0005538338.novalocal sudo[101196]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:56 np0005538338.novalocal sudo[101199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Nov 27 19:44:56 np0005538338.novalocal sudo[101199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:56 np0005538338.novalocal sudo[101199]: pam_unix(sudo:session): session closed for user root Nov 27 19:44:56 np0005538338.novalocal sudo[101202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Nov 27 19:44:56 np0005538338.novalocal sudo[101202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:44:56 np0005538338.novalocal sudo[101202]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:02 np0005538338.novalocal systemd[1]: Starting system activity accounting tool... Nov 27 19:45:02 np0005538338.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Nov 27 19:45:02 np0005538338.novalocal systemd[1]: Finished system activity accounting tool. Nov 27 19:45:02 np0005538338.novalocal sudo[101210]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Nov 27 19:45:02 np0005538338.novalocal sudo[101210]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Nov 27 19:45:05 np0005538338.novalocal sudo[101210]: pam_unix(sudo:session): session closed for user nova Nov 27 19:45:05 np0005538338.novalocal sudo[101218]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Nov 27 19:45:05 np0005538338.novalocal sudo[101218]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Nov 27 19:45:07 np0005538338.novalocal sudo[101218]: pam_unix(sudo:session): session closed for user nova Nov 27 19:45:22 np0005538338.novalocal sudo[101233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Nov 27 19:45:22 np0005538338.novalocal sudo[101233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101236]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Nov 27 19:45:22 np0005538338.novalocal sudo[101236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101236]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101239]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Nov 27 19:45:22 np0005538338.novalocal sudo[101239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101239]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101242]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Nov 27 19:45:22 np0005538338.novalocal sudo[101242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101242]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101245]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Nov 27 19:45:22 np0005538338.novalocal sudo[101245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101245]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101248]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Nov 27 19:45:22 np0005538338.novalocal sudo[101248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101248]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101251]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Nov 27 19:45:22 np0005538338.novalocal sudo[101251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101251]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101254]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:22 np0005538338.novalocal sudo[101254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101254]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101257]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:22 np0005538338.novalocal sudo[101257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101257]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101260]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Nov 27 19:45:22 np0005538338.novalocal sudo[101260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101260]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101263]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Nov 27 19:45:22 np0005538338.novalocal sudo[101263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101263]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101266]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:22 np0005538338.novalocal sudo[101266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101266]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101269]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:22 np0005538338.novalocal sudo[101269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101269]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101272]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Nov 27 19:45:22 np0005538338.novalocal sudo[101272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101272]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101275]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Nov 27 19:45:22 np0005538338.novalocal sudo[101275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101275]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101278]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:22 np0005538338.novalocal sudo[101278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101278]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101281]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:22 np0005538338.novalocal sudo[101281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101281]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101284]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Nov 27 19:45:22 np0005538338.novalocal sudo[101284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101284]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101287]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Nov 27 19:45:22 np0005538338.novalocal sudo[101287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101287]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101290]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Nov 27 19:45:22 np0005538338.novalocal sudo[101290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101290]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101293]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Nov 27 19:45:22 np0005538338.novalocal sudo[101293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:22 np0005538338.novalocal sudo[101293]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:22 np0005538338.novalocal sudo[101296]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:23 np0005538338.novalocal sudo[101296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101296]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101299]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:23 np0005538338.novalocal sudo[101299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101299]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101302]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Nov 27 19:45:23 np0005538338.novalocal sudo[101302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101302]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101305]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:23 np0005538338.novalocal sudo[101305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101305]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101308]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:23 np0005538338.novalocal sudo[101308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101308]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101311]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Nov 27 19:45:23 np0005538338.novalocal sudo[101311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101311]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101314]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Nov 27 19:45:23 np0005538338.novalocal sudo[101314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101314]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101317]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Nov 27 19:45:23 np0005538338.novalocal sudo[101317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101317]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101320]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Nov 27 19:45:23 np0005538338.novalocal sudo[101320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101320]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101323]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Nov 27 19:45:23 np0005538338.novalocal sudo[101323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101323]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101326]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Nov 27 19:45:23 np0005538338.novalocal sudo[101326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101326]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101329]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Nov 27 19:45:23 np0005538338.novalocal sudo[101329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101329]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101332]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Nov 27 19:45:23 np0005538338.novalocal sudo[101332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101332]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101335]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Nov 27 19:45:23 np0005538338.novalocal sudo[101335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101335]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101338]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-metadata-agent Nov 27 19:45:23 np0005538338.novalocal sudo[101338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101338]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101341]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Nov 27 19:45:23 np0005538338.novalocal sudo[101341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101341]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101344]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Nov 27 19:45:23 np0005538338.novalocal sudo[101344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101344]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101347]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Nov 27 19:45:23 np0005538338.novalocal sudo[101347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101347]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101350]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Nov 27 19:45:23 np0005538338.novalocal sudo[101350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101350]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101353]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Nov 27 19:45:23 np0005538338.novalocal sudo[101353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101353]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101356]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:23 np0005538338.novalocal sudo[101356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101356]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101359]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:23 np0005538338.novalocal sudo[101359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101359]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101362]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Nov 27 19:45:23 np0005538338.novalocal sudo[101362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101362]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101365]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:23 np0005538338.novalocal sudo[101365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101365]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101368]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:23 np0005538338.novalocal sudo[101368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101368]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101371]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Nov 27 19:45:23 np0005538338.novalocal sudo[101371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101371]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101374]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Nov 27 19:45:23 np0005538338.novalocal sudo[101374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101374]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101377]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Nov 27 19:45:23 np0005538338.novalocal sudo[101377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101377]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101380]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Nov 27 19:45:23 np0005538338.novalocal sudo[101380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:23 np0005538338.novalocal sudo[101380]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:23 np0005538338.novalocal sudo[101383]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Nov 27 19:45:24 np0005538338.novalocal sudo[101383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101383]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101386]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Nov 27 19:45:24 np0005538338.novalocal sudo[101386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101386]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101389]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Nov 27 19:45:24 np0005538338.novalocal sudo[101389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101389]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101392]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Nov 27 19:45:24 np0005538338.novalocal sudo[101392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101392]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101395]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Nov 27 19:45:24 np0005538338.novalocal sudo[101395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101395]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101398]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Nov 27 19:45:24 np0005538338.novalocal sudo[101398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101398]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101401]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:24 np0005538338.novalocal sudo[101401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101401]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101404]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:24 np0005538338.novalocal sudo[101404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101404]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101407]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Nov 27 19:45:24 np0005538338.novalocal sudo[101407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101407]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101410]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Nov 27 19:45:24 np0005538338.novalocal sudo[101410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101410]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101413]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Nov 27 19:45:24 np0005538338.novalocal sudo[101413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101413]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101416]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Nov 27 19:45:24 np0005538338.novalocal sudo[101416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101416]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101419]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Nov 27 19:45:24 np0005538338.novalocal sudo[101419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101419]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101422]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:24 np0005538338.novalocal sudo[101422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101422]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101425]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Nov 27 19:45:24 np0005538338.novalocal sudo[101425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101425]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101428]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Nov 27 19:45:24 np0005538338.novalocal sudo[101428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101428]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101431]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Nov 27 19:45:24 np0005538338.novalocal sudo[101431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101431]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101434]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Nov 27 19:45:24 np0005538338.novalocal sudo[101434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101434]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101437]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Nov 27 19:45:24 np0005538338.novalocal sudo[101437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101437]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101440]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Nov 27 19:45:24 np0005538338.novalocal sudo[101440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101440]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101443]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Nov 27 19:45:24 np0005538338.novalocal sudo[101443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101443]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101446]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Nov 27 19:45:24 np0005538338.novalocal sudo[101446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101446]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101449]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Nov 27 19:45:24 np0005538338.novalocal sudo[101449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101449]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101452]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Nov 27 19:45:24 np0005538338.novalocal sudo[101452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101452]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101455]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Nov 27 19:45:24 np0005538338.novalocal sudo[101455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101455]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101458]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Nov 27 19:45:24 np0005538338.novalocal sudo[101458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101458]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101461]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Nov 27 19:45:24 np0005538338.novalocal sudo[101461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101461]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101464]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Nov 27 19:45:24 np0005538338.novalocal sudo[101464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:24 np0005538338.novalocal sudo[101464]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:24 np0005538338.novalocal sudo[101467]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Nov 27 19:45:25 np0005538338.novalocal sudo[101467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101467]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101470]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Nov 27 19:45:25 np0005538338.novalocal sudo[101470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101470]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101473]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Nov 27 19:45:25 np0005538338.novalocal sudo[101473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101473]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101476]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Nov 27 19:45:25 np0005538338.novalocal sudo[101476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101476]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101479]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Nov 27 19:45:25 np0005538338.novalocal sudo[101479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101479]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101482]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Nov 27 19:45:25 np0005538338.novalocal sudo[101482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101482]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101485]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Nov 27 19:45:25 np0005538338.novalocal sudo[101485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101485]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101488]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Nov 27 19:45:25 np0005538338.novalocal sudo[101488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101488]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101491]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Nov 27 19:45:25 np0005538338.novalocal sudo[101491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101491]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101494]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Nov 27 19:45:25 np0005538338.novalocal sudo[101494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101494]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101497]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Nov 27 19:45:25 np0005538338.novalocal sudo[101497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101497]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101500]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Nov 27 19:45:25 np0005538338.novalocal sudo[101500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101500]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101503]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Nov 27 19:45:25 np0005538338.novalocal sudo[101503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101503]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101506]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Nov 27 19:45:25 np0005538338.novalocal sudo[101506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101506]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101509]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Nov 27 19:45:25 np0005538338.novalocal sudo[101509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101509]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101512]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Nov 27 19:45:25 np0005538338.novalocal sudo[101512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101512]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101515]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Nov 27 19:45:25 np0005538338.novalocal sudo[101515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101515]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101518]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Nov 27 19:45:25 np0005538338.novalocal sudo[101518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101518]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101521]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Nov 27 19:45:25 np0005538338.novalocal sudo[101521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101521]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101524]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Nov 27 19:45:25 np0005538338.novalocal sudo[101524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101524]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101527]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Nov 27 19:45:25 np0005538338.novalocal sudo[101527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101527]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101530]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Nov 27 19:45:25 np0005538338.novalocal sudo[101530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101530]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101533]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Nov 27 19:45:25 np0005538338.novalocal sudo[101533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101533]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101536]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Nov 27 19:45:25 np0005538338.novalocal sudo[101536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101536]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101539]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Nov 27 19:45:25 np0005538338.novalocal sudo[101539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101539]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101542]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Nov 27 19:45:25 np0005538338.novalocal sudo[101542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101542]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101545]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Nov 27 19:45:25 np0005538338.novalocal sudo[101545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101545]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101548]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Nov 27 19:45:25 np0005538338.novalocal sudo[101548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101548]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101551]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Nov 27 19:45:25 np0005538338.novalocal sudo[101551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:25 np0005538338.novalocal sudo[101551]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:25 np0005538338.novalocal sudo[101554]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Nov 27 19:45:26 np0005538338.novalocal sudo[101554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101554]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101557]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Nov 27 19:45:26 np0005538338.novalocal sudo[101557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101557]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101560]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Nov 27 19:45:26 np0005538338.novalocal sudo[101560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101560]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101233]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Nov 27 19:45:26 np0005538338.novalocal sudo[101563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101566]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251127_192827.log Nov 27 19:45:26 np0005538338.novalocal sudo[101566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101566]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101569]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251127_193221.log Nov 27 19:45:26 np0005538338.novalocal sudo[101569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101569]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101572]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Nov 27 19:45:26 np0005538338.novalocal sudo[101572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101572]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101575]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101575]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101578]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Nov 27 19:45:26 np0005538338.novalocal sudo[101578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101578]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101581]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101581]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101584]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:26 np0005538338.novalocal sudo[101584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101584]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101587]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:26 np0005538338.novalocal sudo[101587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101587]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101590]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:26 np0005538338.novalocal sudo[101590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101590]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101593]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Nov 27 19:45:26 np0005538338.novalocal sudo[101593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101593]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101596]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101596]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101599]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101599]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101602]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101602]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101605]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101605]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101608]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101608]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101611]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Nov 27 19:45:26 np0005538338.novalocal sudo[101611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101611]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101614]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Nov 27 19:45:26 np0005538338.novalocal sudo[101614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101614]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101617]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:26 np0005538338.novalocal sudo[101617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101617]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101620]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Nov 27 19:45:26 np0005538338.novalocal sudo[101620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101620]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101623]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Nov 27 19:45:26 np0005538338.novalocal sudo[101623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101623]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101626]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Nov 27 19:45:26 np0005538338.novalocal sudo[101626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101626]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101629]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Nov 27 19:45:26 np0005538338.novalocal sudo[101629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101629]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101632]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Nov 27 19:45:26 np0005538338.novalocal sudo[101632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101632]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:26 np0005538338.novalocal sudo[101635]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Nov 27 19:45:26 np0005538338.novalocal sudo[101635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:26 np0005538338.novalocal sudo[101635]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101638]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Nov 27 19:45:27 np0005538338.novalocal sudo[101638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101638]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101641]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Nov 27 19:45:27 np0005538338.novalocal sudo[101641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101641]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101644]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Nov 27 19:45:27 np0005538338.novalocal sudo[101644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101644]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101647]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Nov 27 19:45:27 np0005538338.novalocal sudo[101647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101647]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101650]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Nov 27 19:45:27 np0005538338.novalocal sudo[101650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101650]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101653]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Nov 27 19:45:27 np0005538338.novalocal sudo[101653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101653]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101656]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Nov 27 19:45:27 np0005538338.novalocal sudo[101656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101656]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101659]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Nov 27 19:45:27 np0005538338.novalocal sudo[101659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101659]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101662]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Nov 27 19:45:27 np0005538338.novalocal sudo[101662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101662]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101665]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Nov 27 19:45:27 np0005538338.novalocal sudo[101665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101665]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101668]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Nov 27 19:45:27 np0005538338.novalocal sudo[101668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101668]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101671]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Nov 27 19:45:27 np0005538338.novalocal sudo[101671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101671]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101674]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Nov 27 19:45:27 np0005538338.novalocal sudo[101674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101674]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101677]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Nov 27 19:45:27 np0005538338.novalocal sudo[101677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101677]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101680]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Nov 27 19:45:27 np0005538338.novalocal sudo[101680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101680]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101683]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Nov 27 19:45:27 np0005538338.novalocal sudo[101683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101683]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101686]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Nov 27 19:45:27 np0005538338.novalocal sudo[101686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101686]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101689]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Nov 27 19:45:27 np0005538338.novalocal sudo[101689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101689]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101694]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Nov 27 19:45:27 np0005538338.novalocal sudo[101694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101694]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101697]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Nov 27 19:45:27 np0005538338.novalocal sudo[101697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101697]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101700]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Nov 27 19:45:27 np0005538338.novalocal sudo[101700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101700]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101703]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Nov 27 19:45:27 np0005538338.novalocal sudo[101703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101703]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101706]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Nov 27 19:45:27 np0005538338.novalocal sudo[101706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101706]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101709]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Nov 27 19:45:27 np0005538338.novalocal sudo[101709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101709]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101712]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Nov 27 19:45:27 np0005538338.novalocal sudo[101712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101712]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101715]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Nov 27 19:45:27 np0005538338.novalocal sudo[101715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101715]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101718]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Nov 27 19:45:27 np0005538338.novalocal sudo[101718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101718]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101721]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Nov 27 19:45:27 np0005538338.novalocal sudo[101721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101721]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101724]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Nov 27 19:45:27 np0005538338.novalocal sudo[101724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101724]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101727]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Nov 27 19:45:27 np0005538338.novalocal sudo[101727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101727]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101730]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Nov 27 19:45:27 np0005538338.novalocal sudo[101730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101730]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101733]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Nov 27 19:45:27 np0005538338.novalocal sudo[101733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101733]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101736]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:27 np0005538338.novalocal sudo[101736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101736]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101739]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:27 np0005538338.novalocal sudo[101739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101739]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:27 np0005538338.novalocal sudo[101742]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Nov 27 19:45:27 np0005538338.novalocal sudo[101742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:27 np0005538338.novalocal sudo[101742]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101745]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Nov 27 19:45:28 np0005538338.novalocal sudo[101745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101745]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101748]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Nov 27 19:45:28 np0005538338.novalocal sudo[101748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101748]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101751]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Nov 27 19:45:28 np0005538338.novalocal sudo[101751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101751]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101754]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Nov 27 19:45:28 np0005538338.novalocal sudo[101754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101754]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101757]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101757]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101760]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101760]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101763]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101763]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101766]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:28 np0005538338.novalocal sudo[101766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101766]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101769]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101769]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101772]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101772]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101775]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101775]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101778]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101778]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101781]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101781]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101784]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101784]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101787]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101787]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101790]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101790]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101793]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101793]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101796]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_ovn_metadata_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101796]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101799]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101799]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101802]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101802]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101805]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101805]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101808]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101808]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101811]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Nov 27 19:45:28 np0005538338.novalocal sudo[101811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101811]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101814]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:28 np0005538338.novalocal sudo[101814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101814]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101817]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Nov 27 19:45:28 np0005538338.novalocal sudo[101817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101817]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101820]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101820]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101823]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101823]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101826]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101826]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101829]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Nov 27 19:45:28 np0005538338.novalocal sudo[101829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101829]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101832]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101832]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101835]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Nov 27 19:45:28 np0005538338.novalocal sudo[101835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101835]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101838]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Nov 27 19:45:28 np0005538338.novalocal sudo[101838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101838]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101841]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101841]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101844]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Nov 27 19:45:28 np0005538338.novalocal sudo[101844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:28 np0005538338.novalocal sudo[101844]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:28 np0005538338.novalocal sudo[101847]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:29 np0005538338.novalocal sudo[101847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101847]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101850]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101850]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101853]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Nov 27 19:45:29 np0005538338.novalocal sudo[101853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101853]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101857]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:29 np0005538338.novalocal sudo[101854]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Nov 27 19:45:29 np0005538338.novalocal sudo[101857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101857]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal systemd[1]: Started Session c348 of User root. Nov 27 19:45:29 np0005538338.novalocal sudo[101854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:45:29 np0005538338.novalocal sudo[101861]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101861]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101865]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101865]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101868]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101868]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101871]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101871]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101874]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101874]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101877]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101877]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101880]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101880]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101884]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101884]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101887]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101887]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101854]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal systemd[1]: session-c348.scope: Deactivated successfully. Nov 27 19:45:29 np0005538338.novalocal sudo[101890]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101890]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101894]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Nov 27 19:45:29 np0005538338.novalocal sudo[101894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101894]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101892]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:45:29 np0005538338.novalocal sudo[101897]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Nov 27 19:45:29 np0005538338.novalocal systemd[1]: Started Session c349 of User root. Nov 27 19:45:29 np0005538338.novalocal sudo[101892]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:45:29 np0005538338.novalocal sudo[101897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101897]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101902]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Nov 27 19:45:29 np0005538338.novalocal sudo[101902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101902]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101905]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:29 np0005538338.novalocal sudo[101905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101905]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101908]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Nov 27 19:45:29 np0005538338.novalocal sudo[101908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101908]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101911]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Nov 27 19:45:29 np0005538338.novalocal sudo[101911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101911]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101914]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Nov 27 19:45:29 np0005538338.novalocal sudo[101914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101914]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101918]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Nov 27 19:45:29 np0005538338.novalocal sudo[101918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101918]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101921]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Nov 27 19:45:29 np0005538338.novalocal sudo[101921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101921]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101924]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Nov 27 19:45:29 np0005538338.novalocal sudo[101924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101924]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101892]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal systemd[1]: session-c349.scope: Deactivated successfully. Nov 27 19:45:29 np0005538338.novalocal sudo[101927]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Nov 27 19:45:29 np0005538338.novalocal sudo[101927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101927]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal sudo[101931]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Nov 27 19:45:29 np0005538338.novalocal sudo[101929]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Nov 27 19:45:29 np0005538338.novalocal sudo[101931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101931]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:29 np0005538338.novalocal systemd[1]: Started Session c350 of User root. Nov 27 19:45:29 np0005538338.novalocal sudo[101929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:45:29 np0005538338.novalocal sudo[101935]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Nov 27 19:45:29 np0005538338.novalocal sudo[101935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:29 np0005538338.novalocal sudo[101935]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101939]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Nov 27 19:45:30 np0005538338.novalocal sudo[101939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101939]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101942]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Nov 27 19:45:30 np0005538338.novalocal sudo[101942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101942]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101945]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Nov 27 19:45:30 np0005538338.novalocal sudo[101945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101945]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101948]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Nov 27 19:45:30 np0005538338.novalocal sudo[101948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101948]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101951]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Nov 27 19:45:30 np0005538338.novalocal sudo[101951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101951]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101954]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Nov 27 19:45:30 np0005538338.novalocal sudo[101954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101954]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101957]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Nov 27 19:45:30 np0005538338.novalocal sudo[101957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101957]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101960]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Nov 27 19:45:30 np0005538338.novalocal sudo[101960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101960]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101964]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Nov 27 19:45:30 np0005538338.novalocal sudo[101964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101964]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101967]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Nov 27 19:45:30 np0005538338.novalocal sudo[101967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101967]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101929]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal systemd[1]: session-c350.scope: Deactivated successfully. Nov 27 19:45:30 np0005538338.novalocal sudo[101970]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Nov 27 19:45:30 np0005538338.novalocal sudo[101970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101970]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101972]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Nov 27 19:45:30 np0005538338.novalocal sudo[101974]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Nov 27 19:45:30 np0005538338.novalocal systemd[1]: Started Session c351 of User root. Nov 27 19:45:30 np0005538338.novalocal sudo[101972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Nov 27 19:45:30 np0005538338.novalocal sudo[101974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101974]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101979]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Nov 27 19:45:30 np0005538338.novalocal sudo[101979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101979]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101982]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Nov 27 19:45:30 np0005538338.novalocal sudo[101982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101982]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101985]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Nov 27 19:45:30 np0005538338.novalocal sudo[101985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101985]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101988]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Nov 27 19:45:30 np0005538338.novalocal sudo[101988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101988]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101991]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Nov 27 19:45:30 np0005538338.novalocal sudo[101991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101991]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101994]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Nov 27 19:45:30 np0005538338.novalocal sudo[101994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101994]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[101997]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Nov 27 19:45:30 np0005538338.novalocal sudo[101997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[101997]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102001]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Nov 27 19:45:30 np0005538338.novalocal sudo[102001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102001]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102004]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Nov 27 19:45:30 np0005538338.novalocal sudo[102004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102004]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102007]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Nov 27 19:45:30 np0005538338.novalocal sudo[101972]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal systemd[1]: session-c351.scope: Deactivated successfully. Nov 27 19:45:30 np0005538338.novalocal sudo[102007]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102010]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Nov 27 19:45:30 np0005538338.novalocal sudo[102010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102010]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102013]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Nov 27 19:45:30 np0005538338.novalocal sudo[102013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102013]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102016]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Nov 27 19:45:30 np0005538338.novalocal sudo[102016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102016]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102019]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Nov 27 19:45:30 np0005538338.novalocal sudo[102019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102019]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102022]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Nov 27 19:45:30 np0005538338.novalocal sudo[102022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102022]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102025]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:30 np0005538338.novalocal sudo[102025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102025]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102028]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Nov 27 19:45:30 np0005538338.novalocal sudo[102028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:30 np0005538338.novalocal sudo[102028]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:30 np0005538338.novalocal sudo[102031]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102031]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102034]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Nov 27 19:45:31 np0005538338.novalocal sudo[102034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102034]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102037]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102037]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102040]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102040]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102043]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102043]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102046]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102046]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102049]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Nov 27 19:45:31 np0005538338.novalocal sudo[102049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102049]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102052]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:31 np0005538338.novalocal sudo[102052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102052]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102055]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Nov 27 19:45:31 np0005538338.novalocal sudo[102055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102055]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102058]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Nov 27 19:45:31 np0005538338.novalocal sudo[102058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102058]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102061]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102061]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102064]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-arp.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102064]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102067]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcp-server.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102067]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102070]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcp.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102070]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102073]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcpv6-server.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102073]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102076]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcpv6.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102076]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102079]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-incoming-ipv4.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102079]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102090]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-incoming-ipv6.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102090]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102093]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-ipv4.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102093]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102124]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-ipv6.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102124]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102127]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./clean-traffic-gateway.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102127]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102130]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./clean-traffic.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102130]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102133]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-ip-spoofing.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102133]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102136]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-mac-spoofing.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102136]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102139]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-spoofing.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102139]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102142]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ip-multicast.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102142]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102145]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ip-spoofing.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102145]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102148]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ipv6-multicast.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102148]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102151]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ipv6-spoofing.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102151]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102154]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-mac-broadcast.xml Nov 27 19:45:31 np0005538338.novalocal sudo[102154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:31 np0005538338.novalocal sudo[102154]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:31 np0005538338.novalocal sudo[102157]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-mac-spoofing.xml Nov 27 19:45:32 np0005538338.novalocal sudo[102157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102157]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102160]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-other-l2-traffic.xml Nov 27 19:45:32 np0005538338.novalocal sudo[102160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102160]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102163]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-other-rarp-traffic.xml Nov 27 19:45:32 np0005538338.novalocal sudo[102163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102163]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102166]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-announce-self-rarp.xml Nov 27 19:45:32 np0005538338.novalocal sudo[102166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102166]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102169]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-announce-self.xml Nov 27 19:45:32 np0005538338.novalocal sudo[102169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102169]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102172]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102172]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102175]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102175]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102178]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102178]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102181]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102181]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102184]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102184]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102187]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102187]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102190]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102190]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102193]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102193]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102196]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102196]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102199]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102199]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102202]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102202]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102205]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102205]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102208]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102208]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102211]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102211]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102214]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102214]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102217]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102217]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102220]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Nov 27 19:45:32 np0005538338.novalocal sudo[102220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102220]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102223]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102223]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102226]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Nov 27 19:45:32 np0005538338.novalocal sudo[102226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102226]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102229]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Nov 27 19:45:32 np0005538338.novalocal sudo[102229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102229]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102232]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Nov 27 19:45:32 np0005538338.novalocal sudo[102232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102232]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102235]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Nov 27 19:45:32 np0005538338.novalocal sudo[102235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102235]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102238]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Nov 27 19:45:32 np0005538338.novalocal sudo[102238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102238]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102241]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Nov 27 19:45:32 np0005538338.novalocal sudo[102241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102241]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:32 np0005538338.novalocal sudo[102244]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Nov 27 19:45:32 np0005538338.novalocal sudo[102244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:32 np0005538338.novalocal sudo[102244]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102247]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Nov 27 19:45:33 np0005538338.novalocal sudo[102247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102247]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102250]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Nov 27 19:45:33 np0005538338.novalocal sudo[102250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102250]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102253]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Nov 27 19:45:33 np0005538338.novalocal sudo[102253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102253]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102256]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Nov 27 19:45:33 np0005538338.novalocal sudo[102256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102256]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102259]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102259]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102262]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Nov 27 19:45:33 np0005538338.novalocal sudo[102262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102262]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102265]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102265]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102268]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102268]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102271]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102271]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102274]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102274]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102277]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102277]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102280]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102280]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102283]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102283]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102286]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102286]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102289]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102289]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102292]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102292]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102295]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102295]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102298]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./access_compat.load Nov 27 19:45:33 np0005538338.novalocal sudo[102298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102298]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102301]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./actions.load Nov 27 19:45:33 np0005538338.novalocal sudo[102301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102301]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102304]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102304]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102307]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Nov 27 19:45:33 np0005538338.novalocal sudo[102307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102307]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102310]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_basic.load Nov 27 19:45:33 np0005538338.novalocal sudo[102310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102310]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102313]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_digest.load Nov 27 19:45:33 np0005538338.novalocal sudo[102313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102313]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102316]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_anon.load Nov 27 19:45:33 np0005538338.novalocal sudo[102316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102316]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102319]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_core.load Nov 27 19:45:33 np0005538338.novalocal sudo[102319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102319]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102322]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_dbm.load Nov 27 19:45:33 np0005538338.novalocal sudo[102322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102322]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102325]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_file.load Nov 27 19:45:33 np0005538338.novalocal sudo[102325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102325]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102328]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Nov 27 19:45:33 np0005538338.novalocal sudo[102328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102328]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102331]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_dbm.load Nov 27 19:45:33 np0005538338.novalocal sudo[102331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102331]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102334]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_groupfile.load Nov 27 19:45:33 np0005538338.novalocal sudo[102334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102334]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102337]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Nov 27 19:45:33 np0005538338.novalocal sudo[102337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102337]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102340]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_owner.load Nov 27 19:45:33 np0005538338.novalocal sudo[102340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102340]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102343]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_user.load Nov 27 19:45:33 np0005538338.novalocal sudo[102343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102343]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102346]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./autoindex.conf Nov 27 19:45:33 np0005538338.novalocal sudo[102346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102346]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102349]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./autoindex.load Nov 27 19:45:33 np0005538338.novalocal sudo[102349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:33 np0005538338.novalocal sudo[102349]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:33 np0005538338.novalocal sudo[102352]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./cache.load Nov 27 19:45:34 np0005538338.novalocal sudo[102352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102352]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102355]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./cgi.load Nov 27 19:45:34 np0005538338.novalocal sudo[102355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102355]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102358]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav_fs.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102358]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102361]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav_fs.load Nov 27 19:45:34 np0005538338.novalocal sudo[102361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102361]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102364]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav.load Nov 27 19:45:34 np0005538338.novalocal sudo[102364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102364]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102367]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./deflate.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102367]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102370]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./deflate.load Nov 27 19:45:34 np0005538338.novalocal sudo[102370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102370]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102373]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dir.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102373]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102376]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dir.load Nov 27 19:45:34 np0005538338.novalocal sudo[102376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102376]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102379]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./env.load Nov 27 19:45:34 np0005538338.novalocal sudo[102379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102379]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102382]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./expires.load Nov 27 19:45:34 np0005538338.novalocal sudo[102382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102382]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102385]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ext_filter.load Nov 27 19:45:34 np0005538338.novalocal sudo[102385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102385]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102388]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Nov 27 19:45:34 np0005538338.novalocal sudo[102388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102388]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102391]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./include.load Nov 27 19:45:34 np0005538338.novalocal sudo[102391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102391]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102394]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Nov 27 19:45:34 np0005538338.novalocal sudo[102394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102394]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102397]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./logio.load Nov 27 19:45:34 np0005538338.novalocal sudo[102397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102397]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102400]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102400]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102403]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Nov 27 19:45:34 np0005538338.novalocal sudo[102403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102403]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102406]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime_magic.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102406]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102409]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime_magic.load Nov 27 19:45:34 np0005538338.novalocal sudo[102409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102409]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102412]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./negotiation.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102412]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102415]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./negotiation.load Nov 27 19:45:34 np0005538338.novalocal sudo[102415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102415]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102418]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102418]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102421]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Nov 27 19:45:34 np0005538338.novalocal sudo[102421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102421]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102424]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./rewrite.load Nov 27 19:45:34 np0005538338.novalocal sudo[102424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102424]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102427]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102427]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102430]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Nov 27 19:45:34 np0005538338.novalocal sudo[102430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102430]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102433]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Nov 27 19:45:34 np0005538338.novalocal sudo[102433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102433]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102436]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./speling.load Nov 27 19:45:34 np0005538338.novalocal sudo[102436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102436]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102439]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102439]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102442]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Nov 27 19:45:34 np0005538338.novalocal sudo[102442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102442]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102445]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./substitute.load Nov 27 19:45:34 np0005538338.novalocal sudo[102445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102445]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102448]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./suexec.load Nov 27 19:45:34 np0005538338.novalocal sudo[102448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102448]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102451]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Nov 27 19:45:34 np0005538338.novalocal sudo[102451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102451]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102454]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Nov 27 19:45:34 np0005538338.novalocal sudo[102454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102454]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102457]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./usertrack.load Nov 27 19:45:34 np0005538338.novalocal sudo[102457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102457]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102460]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./version.load Nov 27 19:45:34 np0005538338.novalocal sudo[102460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102460]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102463]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./vhost_alias.load Nov 27 19:45:34 np0005538338.novalocal sudo[102463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102463]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102466]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Nov 27 19:45:34 np0005538338.novalocal sudo[102466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102466]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102469]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Nov 27 19:45:34 np0005538338.novalocal sudo[102469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102469]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:34 np0005538338.novalocal sudo[102472]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Nov 27 19:45:34 np0005538338.novalocal sudo[102472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:34 np0005538338.novalocal sudo[102472]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102475]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102475]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102478]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102478]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102481]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102481]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102484]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102484]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102487]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102487]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102490]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102490]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102493]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102493]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102496]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102496]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102499]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102499]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102502]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Nov 27 19:45:35 np0005538338.novalocal sudo[102502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102502]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102505]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Nov 27 19:45:35 np0005538338.novalocal sudo[102505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102505]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102508]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Nov 27 19:45:35 np0005538338.novalocal sudo[102508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102508]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102511]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Nov 27 19:45:35 np0005538338.novalocal sudo[102511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102511]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102514]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Nov 27 19:45:35 np0005538338.novalocal sudo[102514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102514]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102517]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Nov 27 19:45:35 np0005538338.novalocal sudo[102517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102517]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102520]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102520]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102523]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Nov 27 19:45:35 np0005538338.novalocal sudo[102523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102523]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102526]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Nov 27 19:45:35 np0005538338.novalocal sudo[102526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102526]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102529]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005538338.novalocal.pem Nov 27 19:45:35 np0005538338.novalocal sudo[102529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102529]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102532]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Nov 27 19:45:35 np0005538338.novalocal sudo[102532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102532]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102535]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-OpenStack-antelope.repo Nov 27 19:45:35 np0005538338.novalocal sudo[102535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102535]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102538]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel.repo.rpmsave Nov 27 19:45:35 np0005538338.novalocal sudo[102538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102538]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102541]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel-next.repo.rpmsave Nov 27 19:45:35 np0005538338.novalocal sudo[102541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102541]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102544]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Nov 27 19:45:35 np0005538338.novalocal sudo[102544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102544]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:35 np0005538338.novalocal sudo[102547]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Storage-common.repo Nov 27 19:45:35 np0005538338.novalocal sudo[102547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:35 np0005538338.novalocal sudo[102547]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102550]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Ceph-Quincy.repo Nov 27 19:45:36 np0005538338.novalocal sudo[102550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102550]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102553]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-NFV-OpenvSwitch.repo Nov 27 19:45:36 np0005538338.novalocal sudo[102553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102553]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102556]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Nov 27 19:45:36 np0005538338.novalocal sudo[102556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102556]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102559]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel-cisco-openh264.repo.rpmsave Nov 27 19:45:36 np0005538338.novalocal sudo[102559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102559]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102562]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Nov 27 19:45:36 np0005538338.novalocal sudo[102562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102562]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102565]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Nov 27 19:45:36 np0005538338.novalocal sudo[102565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102565]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102568]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Nov 27 19:45:36 np0005538338.novalocal sudo[102568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102568]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102571]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Nov 27 19:45:36 np0005538338.novalocal sudo[102571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102571]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102574]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Nov 27 19:45:36 np0005538338.novalocal sudo[102574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102574]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102577]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Nov 27 19:45:36 np0005538338.novalocal sudo[102577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102577]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102580]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Nov 27 19:45:36 np0005538338.novalocal sudo[102580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102580]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102583]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Nov 27 19:45:36 np0005538338.novalocal sudo[102583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102583]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102586]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Nov 27 19:45:36 np0005538338.novalocal sudo[102586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102586]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102589]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Nov 27 19:45:36 np0005538338.novalocal sudo[102589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102589]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102592]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Nov 27 19:45:36 np0005538338.novalocal sudo[102592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102592]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102595]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Nov 27 19:45:36 np0005538338.novalocal sudo[102595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102595]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102598]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Nov 27 19:45:36 np0005538338.novalocal sudo[102598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102598]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102601]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Nov 27 19:45:36 np0005538338.novalocal sudo[102601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102601]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102604]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Nov 27 19:45:36 np0005538338.novalocal sudo[102604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102604]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102607]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Nov 27 19:45:36 np0005538338.novalocal sudo[102607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102607]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102610]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Nov 27 19:45:36 np0005538338.novalocal sudo[102610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102610]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102613]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Nov 27 19:45:36 np0005538338.novalocal sudo[102613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102613]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102616]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Nov 27 19:45:36 np0005538338.novalocal sudo[102616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102616]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102619]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Nov 27 19:45:36 np0005538338.novalocal sudo[102619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102619]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102622]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Nov 27 19:45:36 np0005538338.novalocal sudo[102622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:36 np0005538338.novalocal sudo[102622]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:36 np0005538338.novalocal sudo[102625]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Nov 27 19:45:36 np0005538338.novalocal sudo[102625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102625]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102628]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-metadata-agent.log Nov 27 19:45:37 np0005538338.novalocal sudo[102628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102628]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102631]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Nov 27 19:45:37 np0005538338.novalocal sudo[102631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102631]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102634]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Nov 27 19:45:37 np0005538338.novalocal sudo[102634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102634]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102637]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Nov 27 19:45:37 np0005538338.novalocal sudo[102637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102637]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102640]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Nov 27 19:45:37 np0005538338.novalocal sudo[102640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102640]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102643]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Nov 27 19:45:37 np0005538338.novalocal sudo[102643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102643]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102646]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Nov 27 19:45:37 np0005538338.novalocal sudo[102646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102646]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102649]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Nov 27 19:45:37 np0005538338.novalocal sudo[102649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102649]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102652]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Nov 27 19:45:37 np0005538338.novalocal sudo[102652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102652]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102655]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Nov 27 19:45:37 np0005538338.novalocal sudo[102655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102655]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102658]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Nov 27 19:45:37 np0005538338.novalocal sudo[102658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102658]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102662]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Nov 27 19:45:37 np0005538338.novalocal sudo[102662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102662]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102665]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Nov 27 19:45:37 np0005538338.novalocal sudo[102665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102665]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102668]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.log Nov 27 19:45:37 np0005538338.novalocal sudo[102668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102668]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102671]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Nov 27 19:45:37 np0005538338.novalocal sudo[102671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102671]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102674]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Nov 27 19:45:37 np0005538338.novalocal sudo[102674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102674]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102677]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Nov 27 19:45:37 np0005538338.novalocal sudo[102677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102677]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102682]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Nov 27 19:45:37 np0005538338.novalocal sudo[102682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102682]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102685]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102685]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102688]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102688]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102691]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102691]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102694]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102694]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102697]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102697]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102700]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102700]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102703]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Nov 27 19:45:37 np0005538338.novalocal sudo[102703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102703]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102706]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Nov 27 19:45:37 np0005538338.novalocal sudo[102706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102706]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102709]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Nov 27 19:45:37 np0005538338.novalocal sudo[102709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102709]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:37 np0005538338.novalocal sudo[102712]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Nov 27 19:45:37 np0005538338.novalocal sudo[102712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:37 np0005538338.novalocal sudo[102712]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102715]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Nov 27 19:45:38 np0005538338.novalocal sudo[102715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102715]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102718]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Nov 27 19:45:38 np0005538338.novalocal sudo[102718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102718]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102721]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Nov 27 19:45:38 np0005538338.novalocal sudo[102721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102721]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102724]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Nov 27 19:45:38 np0005538338.novalocal sudo[102724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102724]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102727]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Nov 27 19:45:38 np0005538338.novalocal sudo[102727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102727]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102730]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Nov 27 19:45:38 np0005538338.novalocal sudo[102730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102730]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102733]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Nov 27 19:45:38 np0005538338.novalocal sudo[102733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102733]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102736]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Nov 27 19:45:38 np0005538338.novalocal sudo[102736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102736]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102739]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Nov 27 19:45:38 np0005538338.novalocal sudo[102739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102739]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102742]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Nov 27 19:45:38 np0005538338.novalocal sudo[102742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102742]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102745]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Nov 27 19:45:38 np0005538338.novalocal sudo[102745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102745]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102748]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Nov 27 19:45:38 np0005538338.novalocal sudo[102748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102748]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102751]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Nov 27 19:45:38 np0005538338.novalocal sudo[102751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102751]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102754]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Nov 27 19:45:38 np0005538338.novalocal sudo[102754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102754]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102757]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Nov 27 19:45:38 np0005538338.novalocal sudo[102757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102757]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102760]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Nov 27 19:45:38 np0005538338.novalocal sudo[102760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102760]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102763]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Nov 27 19:45:38 np0005538338.novalocal sudo[102763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102763]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102766]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Nov 27 19:45:38 np0005538338.novalocal sudo[102766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102766]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102769]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Nov 27 19:45:38 np0005538338.novalocal sudo[102769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102769]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102772]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Nov 27 19:45:38 np0005538338.novalocal sudo[102772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102772]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102775]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Nov 27 19:45:38 np0005538338.novalocal sudo[102775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102775]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102778]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Nov 27 19:45:38 np0005538338.novalocal sudo[102778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102778]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102781]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Nov 27 19:45:38 np0005538338.novalocal sudo[102781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102781]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102784]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Nov 27 19:45:38 np0005538338.novalocal sudo[102784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102784]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102787]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Nov 27 19:45:38 np0005538338.novalocal sudo[102787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102787]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102790]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Nov 27 19:45:38 np0005538338.novalocal sudo[102790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102790]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102793]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Nov 27 19:45:38 np0005538338.novalocal sudo[102793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102793]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102796]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Nov 27 19:45:38 np0005538338.novalocal sudo[102796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102796]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:38 np0005538338.novalocal sudo[102799]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Nov 27 19:45:38 np0005538338.novalocal sudo[102799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:38 np0005538338.novalocal sudo[102799]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102802]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Nov 27 19:45:39 np0005538338.novalocal sudo[102802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102802]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102805]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Nov 27 19:45:39 np0005538338.novalocal sudo[102805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102805]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102808]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Nov 27 19:45:39 np0005538338.novalocal sudo[102808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102808]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102811]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Nov 27 19:45:39 np0005538338.novalocal sudo[102811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102811]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102814]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102814]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102817]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102817]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102820]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102820]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102823]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102823]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102826]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102826]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102829]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102829]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102832]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102832]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102835]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Nov 27 19:45:39 np0005538338.novalocal sudo[102835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102835]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102838]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Nov 27 19:45:39 np0005538338.novalocal sudo[102838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102838]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102841]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102841]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102844]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102844]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102847]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102847]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102850]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102850]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102853]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102853]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102856]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102856]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102859]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Nov 27 19:45:39 np0005538338.novalocal sudo[102859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102859]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102862]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Nov 27 19:45:39 np0005538338.novalocal sudo[102862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102862]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102865]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Nov 27 19:45:39 np0005538338.novalocal sudo[102865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102865]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102868]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Nov 27 19:45:39 np0005538338.novalocal sudo[102868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102868]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102871]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Nov 27 19:45:39 np0005538338.novalocal sudo[102871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102871]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102874]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Nov 27 19:45:39 np0005538338.novalocal sudo[102874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102874]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102877]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Nov 27 19:45:39 np0005538338.novalocal sudo[102877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102877]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102880]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Nov 27 19:45:39 np0005538338.novalocal sudo[102880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102880]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102883]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Nov 27 19:45:39 np0005538338.novalocal sudo[102883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:39 np0005538338.novalocal sudo[102883]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:39 np0005538338.novalocal sudo[102886]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Nov 27 19:45:39 np0005538338.novalocal sudo[102886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102886]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102889]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102889]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102892]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102892]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102895]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Nov 27 19:45:40 np0005538338.novalocal sudo[102895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102895]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102898]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Nov 27 19:45:40 np0005538338.novalocal sudo[102898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102898]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102901]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102901]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102904]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./openrc.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102904]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102907]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102907]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102910]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102910]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102913]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102913]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102916]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102916]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102919]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102919]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102922]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102922]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102925]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102925]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102928]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102928]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102931]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102931]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102934]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102934]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102937]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102937]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102940]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102940]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102943]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102943]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102946]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102946]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102949]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102949]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102952]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102952]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102955]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102955]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102958]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102958]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:40 np0005538338.novalocal sudo[102961]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Nov 27 19:45:40 np0005538338.novalocal sudo[102961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:40 np0005538338.novalocal sudo[102961]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102964]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Nov 27 19:45:41 np0005538338.novalocal sudo[102964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102964]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102967]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Nov 27 19:45:41 np0005538338.novalocal sudo[102967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102967]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102970]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Nov 27 19:45:41 np0005538338.novalocal sudo[102970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102970]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102973]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Nov 27 19:45:41 np0005538338.novalocal sudo[102973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102973]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102976]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Nov 27 19:45:41 np0005538338.novalocal sudo[102976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102976]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[101563]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Nov 27 19:45:41 np0005538338.novalocal sudo[102981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102981]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Nov 27 19:45:41 np0005538338.novalocal sudo[102984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102987]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Nov 27 19:45:41 np0005538338.novalocal sudo[102987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102987]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102990]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Nov 27 19:45:41 np0005538338.novalocal sudo[102990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102990]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102993]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Nov 27 19:45:41 np0005538338.novalocal sudo[102993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102993]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102996]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Nov 27 19:45:41 np0005538338.novalocal sudo[102996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102996]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[102999]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn-metadata-agent.ini Nov 27 19:45:41 np0005538338.novalocal sudo[102999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[102999]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103002]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Nov 27 19:45:41 np0005538338.novalocal sudo[103002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103002]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103005]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Nov 27 19:45:41 np0005538338.novalocal sudo[103005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103005]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103008]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103008]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103011]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103011]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103014]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103014]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103017]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103017]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103020]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103020]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103023]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103023]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103026]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103026]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103029]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103029]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103032]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103032]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103035]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103035]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103038]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103038]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103041]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103041]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103044]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103044]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103047]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Nov 27 19:45:41 np0005538338.novalocal sudo[103047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:41 np0005538338.novalocal sudo[103047]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:41 np0005538338.novalocal sudo[103050]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103050]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103053]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103053]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103056]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103056]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103059]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103059]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103062]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103062]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103065]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Nov 27 19:45:42 np0005538338.novalocal sudo[103065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103065]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[102984]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251127_192827.log /var/log/weirdo-project/logs/puppet-20251127_192827.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103069]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251127_193221.log /var/log/weirdo-project/logs/puppet-20251127_193221.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103072]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103075]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103078]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103081]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103084]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103087]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/privsep-helper.log /var/log/weirdo-project/logs/cinder/privsep-helper.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103090]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103093]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103096]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103099]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103102]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103105]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103108]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103111]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103114]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103117]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103120]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103123]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-metadata-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-metadata-agent.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103126]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103129]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103132]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103135]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:42 np0005538338.novalocal sudo[103138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Nov 27 19:45:42 np0005538338.novalocal sudo[103138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:42 np0005538338.novalocal sudo[103138]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103141]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103144]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103147]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103150]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103153]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103156]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103159]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103162]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/octavia.log /var/log/weirdo-project/logs/octavia/octavia.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103165]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103168]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103171]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103174]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103177]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103180]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103183]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103186]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103189]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103192]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103195]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103198]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103201]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103204]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103207]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103210]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103213]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103216]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103219]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103222]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103225]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:43 np0005538338.novalocal sudo[103228]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:43 np0005538338.novalocal sudo[103231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Nov 27 19:45:43 np0005538338.novalocal sudo[103231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103231]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103234]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103237]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103240]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103243]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103246]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103249]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103252]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103255]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103258]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103261]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103264]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103267]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103270]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103273]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103276]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103279]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103282]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103285]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103288]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103291]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103294]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103297]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103300]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103304]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103304]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103307]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:44 np0005538338.novalocal sudo[103310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Nov 27 19:45:44 np0005538338.novalocal sudo[103310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:44 np0005538338.novalocal sudo[103310]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103313]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103316]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103316]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103319]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103319]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103322]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103322]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103325]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103325]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103328]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103331]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103334]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103337]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103340]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103343]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103343]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103346]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103346]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103349]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103349]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103352]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103355]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103355]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103358]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103358]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103361]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103361]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103364]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103364]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103367]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103367]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103370]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103370]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103373]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103376]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103376]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103379]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103382]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103385]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103385]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103388]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103388]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103391]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103391]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103394]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103394]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103397]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103397]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103400]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103400]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:45 np0005538338.novalocal sudo[103403]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Nov 27 19:45:45 np0005538338.novalocal sudo[103403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:45 np0005538338.novalocal sudo[103403]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103406]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103406]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103409]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103409]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103412]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103412]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103415]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103415]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103418]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103418]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103421]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103421]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103424]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103424]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103427]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103427]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103430]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103430]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103433]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103433]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103436]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103436]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103439]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103439]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103442]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103442]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103445]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103445]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103448]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103448]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103451]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103451]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103454]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103454]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103457]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103457]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103460]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103460]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103463]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103466]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103469]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103469]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103472]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103472]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103475]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103475]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103478]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103478]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103481]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.json /var/log/weirdo-project/logs/etc/keystone/policy.json.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103481]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103484]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103484]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103487]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103487]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103490]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103490]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103493]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103493]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:46 np0005538338.novalocal sudo[103496]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Nov 27 19:45:46 np0005538338.novalocal sudo[103496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:46 np0005538338.novalocal sudo[103496]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103499]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103502]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103505]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103508]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103511]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103514]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103517]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103520]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103523]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103526]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn.ini /var/log/weirdo-project/logs/etc/neutron/ovn.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103529]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103532]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103535]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103538]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103541]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103541]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103544]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103544]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103547]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_ovn_metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/neutron_ovn_metadata_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103547]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103550]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103553]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103556]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103559]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103562]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103565]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103570]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103573]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103576]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103579]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103582]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103585]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.json /var/log/weirdo-project/logs/etc/nova/policy.json.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103588]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103591]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103594]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103597]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103600]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:47 np0005538338.novalocal sudo[103603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:47 np0005538338.novalocal sudo[103603]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:47 np0005538338.novalocal sudo[103606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103606]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103609]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103612]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103615]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103618]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103621]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103624]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103627]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103630]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103633]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103636]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103639]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103642]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.json /var/log/weirdo-project/logs/etc/placement/policy.json.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103645]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103648]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103651]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103654]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103657]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103660]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103663]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103666]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103669]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103672]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103675]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103678]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103681]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:48 np0005538338.novalocal sudo[103684]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:48 np0005538338.novalocal sudo[103687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Nov 27 19:45:48 np0005538338.novalocal sudo[103687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103687]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103690]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103693]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103696]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103699]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103702]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103705]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103708]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103711]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103714]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103717]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103720]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103723]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103726]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103729]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103732]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103735]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103738]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103741]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103744]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103747]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103750]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103753]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103756]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103759]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005538338.novalocal.pem.txt Nov 27 19:45:49 np0005538338.novalocal sudo[103762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:49 np0005538338.novalocal sudo[103762]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:49 np0005538338.novalocal sudo[103765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103765]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103768]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103771]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103774]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103777]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103780]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103783]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103786]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005538338.novalocal.pem.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103789]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103792]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103795]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103798]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-arp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-arp.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103801]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp-server.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp-server.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103804]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103807]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6-server.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6-server.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103810]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103813]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv4.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv4.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103816]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv6.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103819]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv4.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv4.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103822]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv6.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103825]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic-gateway.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic-gateway.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103828]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103831]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-ip-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-ip-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103834]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-mac-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-mac-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103837]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103840]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103840]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-multicast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-multicast.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103843]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103846]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-multicast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-multicast.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103849]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103852]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-broadcast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-broadcast.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103855]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103858]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-spoofing.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103858]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103861]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-l2-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-l2-traffic.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103861]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-rarp-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-rarp-traffic.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103864]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self-rarp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self-rarp.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103867]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self.xml.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103870]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:50 np0005538338.novalocal sudo[103873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Nov 27 19:45:50 np0005538338.novalocal sudo[103873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:50 np0005538338.novalocal sudo[103873]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103876]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103879]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103882]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103885]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103888]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103891]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103894]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103897]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103900]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103903]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103906]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103909]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103912]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103915]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103918]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103921]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103924]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103927]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103930]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103933]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103936]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103939]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103942]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103945]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103948]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103951]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103954]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:51 np0005538338.novalocal sudo[103957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Nov 27 19:45:51 np0005538338.novalocal sudo[103957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:51 np0005538338.novalocal sudo[103957]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103960]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103963]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103966]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103969]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103972]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103975]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103978]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103981]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103984]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103987]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103990]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103993]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103996]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[103999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/access_compat.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/access_compat.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[103999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[103999]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/actions.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/actions.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104002]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104005]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104008]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_basic.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_basic.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104011]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_digest.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_digest.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104014]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_anon.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_anon.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104017]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_core.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104020]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_dbm.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_dbm.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104023]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_file.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_file.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104026]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104029]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:52 np0005538338.novalocal sudo[104032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_dbm.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_dbm.load.txt Nov 27 19:45:52 np0005538338.novalocal sudo[104032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:52 np0005538338.novalocal sudo[104032]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_groupfile.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_groupfile.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104035]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104038]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_owner.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_owner.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104041]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_user.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_user.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104044]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104047]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104050]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104050]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104053]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cache.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cache.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104053]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104056]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cgi.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104056]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104059]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104059]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104062]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104062]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104065]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104065]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104068]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104068]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104071]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104071]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104074]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104074]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104077]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104077]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/env.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/env.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104080]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/expires.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/expires.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104083]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ext_filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ext_filter.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104086]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104089]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/include.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/include.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104092]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104095]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104095]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104098]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/logio.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/logio.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104098]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104101]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104101]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104104]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104104]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104107]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104107]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.load.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104110]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:53 np0005538338.novalocal sudo[104113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.conf.txt Nov 27 19:45:53 np0005538338.novalocal sudo[104113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:53 np0005538338.novalocal sudo[104113]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104116]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104116]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104119]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104122]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/rewrite.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/rewrite.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104125]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104128]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104131]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104134]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104137]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/speling.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/speling.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104137]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104140]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104143]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/substitute.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/substitute.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104146]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/suexec.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/suexec.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104149]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104152]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104155]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/usertrack.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/usertrack.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104158]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/version.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/version.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104161]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/vhost_alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/vhost_alias.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104164]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104167]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104170]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104173]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104176]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104176]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104179]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104182]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104185]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104188]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104188]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104191]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Nov 27 19:45:54 np0005538338.novalocal sudo[104191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:54 np0005538338.novalocal sudo[104191]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:54 np0005538338.novalocal sudo[104194]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104194]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104197]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104197]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104200]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104200]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104203]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104203]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104206]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104206]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104209]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104209]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104212]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104212]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104215]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104215]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104218]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104218]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104221]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104221]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104224]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104224]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104227]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104227]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104230]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005538338.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005538338.novalocal.pem.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104230]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104233]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104236]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-OpenStack-antelope.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-OpenStack-antelope.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104236]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104239]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel.repo.rpmsave.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104239]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104242]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel-next.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel-next.repo.rpmsave.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104242]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104245]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104245]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104248]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Storage-common.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Storage-common.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104248]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104251]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Ceph-Quincy.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Ceph-Quincy.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104251]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104254]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-NFV-OpenvSwitch.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-NFV-OpenvSwitch.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104254]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104257]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104257]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104260]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel-cisco-openh264.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel-cisco-openh264.repo.rpmsave.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104260]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104263]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104263]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104266]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104266]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104269]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104269]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104272]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[104275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Nov 27 19:45:55 np0005538338.novalocal sudo[104275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Nov 27 19:45:55 np0005538338.novalocal sudo[104275]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:55 np0005538338.novalocal sudo[100757]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:56 np0005538338.novalocal sudo[104383]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-okvkdkyrcznvyyjlohrvuxqtwgepcxsn ; /usr/bin/python3' Nov 27 19:45:56 np0005538338.novalocal sudo[104383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:56 np0005538338.novalocal python3[104385]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:56 np0005538338.novalocal sudo[104383]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:56 np0005538338.novalocal sudo[104391]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-usxxnrqsnuxkmvkpesrkxmfddybvhzsx ; /usr/bin/python3' Nov 27 19:45:56 np0005538338.novalocal sudo[104391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:56 np0005538338.novalocal python3[104393]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:56 np0005538338.novalocal sudo[104391]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:56 np0005538338.novalocal sudo[104398]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nanvghkksbirgklummqkendfogncwdzq ; /usr/bin/python3' Nov 27 19:45:56 np0005538338.novalocal sudo[104398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:56 np0005538338.novalocal python3[104400]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:56 np0005538338.novalocal sudo[104398]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:56 np0005538338.novalocal sudo[104405]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qmkdishkbclojqqksfxzcclijdcisqve ; /usr/bin/python3' Nov 27 19:45:56 np0005538338.novalocal sudo[104405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:57 np0005538338.novalocal python3[104407]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:57 np0005538338.novalocal sudo[104405]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:57 np0005538338.novalocal sudo[104412]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-utfhatirwtdxzoxyvxbdyomqxsahbpkv ; /usr/bin/python3' Nov 27 19:45:57 np0005538338.novalocal sudo[104412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:57 np0005538338.novalocal python3[104414]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:57 np0005538338.novalocal sudo[104412]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:57 np0005538338.novalocal sudo[104419]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ofgmjecvxcukfmxgyjykwyodkimchfdg ; /usr/bin/python3' Nov 27 19:45:57 np0005538338.novalocal sudo[104419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:57 np0005538338.novalocal python3[104421]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:57 np0005538338.novalocal sudo[104419]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:57 np0005538338.novalocal sudo[104426]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wikdegfzwruggsghdhthkapbrnxxpeby ; /usr/bin/python3' Nov 27 19:45:57 np0005538338.novalocal sudo[104426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:57 np0005538338.novalocal python3[104428]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:57 np0005538338.novalocal sudo[104426]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:57 np0005538338.novalocal sudo[104435]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rhdbvruuznnpqywjdbbdcychantfjwsx ; /usr/bin/python3' Nov 27 19:45:57 np0005538338.novalocal sudo[104435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:58 np0005538338.novalocal python3[104437]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:58 np0005538338.novalocal sudo[104435]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:58 np0005538338.novalocal sudo[104442]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ftnypqbwfynkqtlnidfbeyiztzxwpdzp ; /usr/bin/python3' Nov 27 19:45:58 np0005538338.novalocal sudo[104442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:58 np0005538338.novalocal python3[104444]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:58 np0005538338.novalocal sudo[104442]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:58 np0005538338.novalocal sudo[104449]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-upmmkygzrgpbqrmfptgmpvtgcbutratc ; /usr/bin/python3' Nov 27 19:45:58 np0005538338.novalocal sudo[104449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:58 np0005538338.novalocal python3[104451]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 27 19:45:58 np0005538338.novalocal sudo[104449]: pam_unix(sudo:session): session closed for user root Nov 27 19:45:58 np0005538338.novalocal sudo[104456]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qancefvfbfkohilvxfdbhimtblqowepd ; /usr/bin/python3' Nov 27 19:45:58 np0005538338.novalocal sudo[104456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Nov 27 19:45:58 np0005538338.novalocal python3[104458]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None