Dec 12 13:02:19 localhost kernel: Linux version 5.14.0-648.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Fri Dec 5 11:18:23 UTC 2025 Dec 12 13:02:19 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Dec 12 13:02:19 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-648.el9.x86_64 root=UUID=cbdedf45-ed1d-4952-82a8-33a12c0ba266 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 12 13:02:19 localhost kernel: BIOS-provided physical RAM map: Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 12 13:02:19 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Dec 12 13:02:19 localhost kernel: NX (Execute Disable) protection: active Dec 12 13:02:19 localhost kernel: APIC: Static calls initialized Dec 12 13:02:19 localhost kernel: SMBIOS 2.8 present. Dec 12 13:02:19 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 12 13:02:19 localhost kernel: Hypervisor detected: KVM Dec 12 13:02:19 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 12 13:02:19 localhost kernel: kvm-clock: using sched offset of 3262811355 cycles Dec 12 13:02:19 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 12 13:02:19 localhost kernel: tsc: Detected 2799.998 MHz processor Dec 12 13:02:19 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 12 13:02:19 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 12 13:02:19 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Dec 12 13:02:19 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Dec 12 13:02:19 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 12 13:02:19 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Dec 12 13:02:19 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Dec 12 13:02:19 localhost kernel: Using GB pages for direct mapping Dec 12 13:02:19 localhost kernel: RAMDISK: [mem 0x2d46a000-0x32a2cfff] Dec 12 13:02:19 localhost kernel: ACPI: Early table checksum verification disabled Dec 12 13:02:19 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 12 13:02:19 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 12 13:02:19 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 12 13:02:19 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 12 13:02:19 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Dec 12 13:02:19 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 12 13:02:19 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 12 13:02:19 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Dec 12 13:02:19 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Dec 12 13:02:19 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Dec 12 13:02:19 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Dec 12 13:02:19 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Dec 12 13:02:19 localhost kernel: No NUMA configuration found Dec 12 13:02:19 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Dec 12 13:02:19 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Dec 12 13:02:19 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Dec 12 13:02:19 localhost kernel: Zone ranges: Dec 12 13:02:19 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 12 13:02:19 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 12 13:02:19 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Dec 12 13:02:19 localhost kernel: Device empty Dec 12 13:02:19 localhost kernel: Movable zone start for each node Dec 12 13:02:19 localhost kernel: Early memory node ranges Dec 12 13:02:19 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 12 13:02:19 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Dec 12 13:02:19 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Dec 12 13:02:19 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Dec 12 13:02:19 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 12 13:02:19 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 12 13:02:19 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Dec 12 13:02:19 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Dec 12 13:02:19 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 12 13:02:19 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 12 13:02:19 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 12 13:02:19 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 12 13:02:19 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 12 13:02:19 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 12 13:02:19 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 12 13:02:19 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 12 13:02:19 localhost kernel: TSC deadline timer available Dec 12 13:02:19 localhost kernel: CPU topo: Max. logical packages: 8 Dec 12 13:02:19 localhost kernel: CPU topo: Max. logical dies: 8 Dec 12 13:02:19 localhost kernel: CPU topo: Max. dies per package: 1 Dec 12 13:02:19 localhost kernel: CPU topo: Max. threads per core: 1 Dec 12 13:02:19 localhost kernel: CPU topo: Num. cores per package: 1 Dec 12 13:02:19 localhost kernel: CPU topo: Num. threads per package: 1 Dec 12 13:02:19 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Dec 12 13:02:19 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Dec 12 13:02:19 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Dec 12 13:02:19 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Dec 12 13:02:19 localhost kernel: Booting paravirtualized kernel on KVM Dec 12 13:02:19 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 12 13:02:19 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Dec 12 13:02:19 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Dec 12 13:02:19 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Dec 12 13:02:19 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Dec 12 13:02:19 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Dec 12 13:02:19 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-648.el9.x86_64 root=UUID=cbdedf45-ed1d-4952-82a8-33a12c0ba266 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 12 13:02:19 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-648.el9.x86_64", will be passed to user space. Dec 12 13:02:19 localhost kernel: random: crng init done Dec 12 13:02:19 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 12 13:02:19 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 12 13:02:19 localhost kernel: Fallback order for Node 0: 0 Dec 12 13:02:19 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Dec 12 13:02:19 localhost kernel: Policy zone: Normal Dec 12 13:02:19 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 12 13:02:19 localhost kernel: software IO TLB: area num 8. Dec 12 13:02:19 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Dec 12 13:02:19 localhost kernel: ftrace: allocating 49357 entries in 193 pages Dec 12 13:02:19 localhost kernel: ftrace: allocated 193 pages with 3 groups Dec 12 13:02:19 localhost kernel: Dynamic Preempt: voluntary Dec 12 13:02:19 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Dec 12 13:02:19 localhost kernel: rcu: RCU event tracing is enabled. Dec 12 13:02:19 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Dec 12 13:02:19 localhost kernel: Trampoline variant of Tasks RCU enabled. Dec 12 13:02:19 localhost kernel: Rude variant of Tasks RCU enabled. Dec 12 13:02:19 localhost kernel: Tracing variant of Tasks RCU enabled. Dec 12 13:02:19 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 12 13:02:19 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Dec 12 13:02:19 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 12 13:02:19 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 12 13:02:19 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Dec 12 13:02:19 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Dec 12 13:02:19 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Dec 12 13:02:19 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Dec 12 13:02:19 localhost kernel: Console: colour VGA+ 80x25 Dec 12 13:02:19 localhost kernel: printk: console [ttyS0] enabled Dec 12 13:02:19 localhost kernel: ACPI: Core revision 20230331 Dec 12 13:02:19 localhost kernel: APIC: Switch to symmetric I/O mode setup Dec 12 13:02:19 localhost kernel: x2apic enabled Dec 12 13:02:19 localhost kernel: APIC: Switched APIC routing to: physical x2apic Dec 12 13:02:19 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 12 13:02:19 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 12 13:02:19 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 12 13:02:19 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 12 13:02:19 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 12 13:02:19 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 12 13:02:19 localhost kernel: Spectre V2 : Mitigation: Retpolines Dec 12 13:02:19 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Dec 12 13:02:19 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 12 13:02:19 localhost kernel: RETBleed: Mitigation: untrained return thunk Dec 12 13:02:19 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 12 13:02:19 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Dec 12 13:02:19 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Dec 12 13:02:19 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Dec 12 13:02:19 localhost kernel: x86/bugs: return thunk changed Dec 12 13:02:19 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Dec 12 13:02:19 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 12 13:02:19 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 12 13:02:19 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 12 13:02:19 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 12 13:02:19 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 12 13:02:19 localhost kernel: Freeing SMP alternatives memory: 40K Dec 12 13:02:19 localhost kernel: pid_max: default: 32768 minimum: 301 Dec 12 13:02:19 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Dec 12 13:02:19 localhost kernel: landlock: Up and running. Dec 12 13:02:19 localhost kernel: Yama: becoming mindful. Dec 12 13:02:19 localhost kernel: SELinux: Initializing. Dec 12 13:02:19 localhost kernel: LSM support for eBPF active Dec 12 13:02:19 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 12 13:02:19 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 12 13:02:19 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 12 13:02:19 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 12 13:02:19 localhost kernel: ... version: 0 Dec 12 13:02:19 localhost kernel: ... bit width: 48 Dec 12 13:02:19 localhost kernel: ... generic registers: 6 Dec 12 13:02:19 localhost kernel: ... value mask: 0000ffffffffffff Dec 12 13:02:19 localhost kernel: ... max period: 00007fffffffffff Dec 12 13:02:19 localhost kernel: ... fixed-purpose events: 0 Dec 12 13:02:19 localhost kernel: ... event mask: 000000000000003f Dec 12 13:02:19 localhost kernel: signal: max sigframe size: 1776 Dec 12 13:02:19 localhost kernel: rcu: Hierarchical SRCU implementation. Dec 12 13:02:19 localhost kernel: rcu: Max phase no-delay instances is 400. Dec 12 13:02:19 localhost kernel: smp: Bringing up secondary CPUs ... Dec 12 13:02:19 localhost kernel: smpboot: x86: Booting SMP configuration: Dec 12 13:02:19 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Dec 12 13:02:19 localhost kernel: smp: Brought up 1 node, 8 CPUs Dec 12 13:02:19 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Dec 12 13:02:19 localhost kernel: node 0 deferred pages initialised in 11ms Dec 12 13:02:19 localhost kernel: Memory: 7764012K/8388068K available (16384K kernel code, 5795K rwdata, 13916K rodata, 4192K init, 7164K bss, 618224K reserved, 0K cma-reserved) Dec 12 13:02:19 localhost kernel: devtmpfs: initialized Dec 12 13:02:19 localhost kernel: x86/mm: Memory block size: 128MB Dec 12 13:02:19 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 12 13:02:19 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Dec 12 13:02:19 localhost kernel: pinctrl core: initialized pinctrl subsystem Dec 12 13:02:19 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 12 13:02:19 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Dec 12 13:02:19 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 12 13:02:19 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 12 13:02:19 localhost kernel: audit: initializing netlink subsys (disabled) Dec 12 13:02:19 localhost kernel: audit: type=2000 audit(1765562538.217:1): state=initialized audit_enabled=0 res=1 Dec 12 13:02:19 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Dec 12 13:02:19 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 12 13:02:19 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Dec 12 13:02:19 localhost kernel: cpuidle: using governor menu Dec 12 13:02:19 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 12 13:02:19 localhost kernel: PCI: Using configuration type 1 for base access Dec 12 13:02:19 localhost kernel: PCI: Using configuration type 1 for extended access Dec 12 13:02:19 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 12 13:02:19 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Dec 12 13:02:19 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Dec 12 13:02:19 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Dec 12 13:02:19 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Dec 12 13:02:19 localhost kernel: Demotion targets for Node 0: null Dec 12 13:02:19 localhost kernel: cryptd: max_cpu_qlen set to 1000 Dec 12 13:02:19 localhost kernel: ACPI: Added _OSI(Module Device) Dec 12 13:02:19 localhost kernel: ACPI: Added _OSI(Processor Device) Dec 12 13:02:19 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 12 13:02:19 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 12 13:02:19 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 12 13:02:19 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Dec 12 13:02:19 localhost kernel: ACPI: Interpreter enabled Dec 12 13:02:19 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Dec 12 13:02:19 localhost kernel: ACPI: Using IOAPIC for interrupt routing Dec 12 13:02:19 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 12 13:02:19 localhost kernel: PCI: Using E820 reservations for host bridge windows Dec 12 13:02:19 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 12 13:02:19 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 12 13:02:19 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Dec 12 13:02:19 localhost kernel: acpiphp: Slot [3] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [4] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [5] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [6] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [7] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [8] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [9] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [10] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [11] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [12] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [13] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [14] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [15] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [16] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [17] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [18] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [19] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [20] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [21] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [22] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [23] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [24] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [25] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [26] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [27] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [28] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [29] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [30] registered Dec 12 13:02:19 localhost kernel: acpiphp: Slot [31] registered Dec 12 13:02:19 localhost kernel: PCI host bridge to bus 0000:00 Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 12 13:02:19 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Dec 12 13:02:19 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Dec 12 13:02:19 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Dec 12 13:02:19 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 12 13:02:19 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 12 13:02:19 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Dec 12 13:02:19 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Dec 12 13:02:19 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Dec 12 13:02:19 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Dec 12 13:02:19 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Dec 12 13:02:19 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 12 13:02:19 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Dec 12 13:02:19 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Dec 12 13:02:19 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Dec 12 13:02:19 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 12 13:02:19 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 12 13:02:19 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 12 13:02:19 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 12 13:02:19 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 12 13:02:19 localhost kernel: iommu: Default domain type: Translated Dec 12 13:02:19 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 12 13:02:19 localhost kernel: SCSI subsystem initialized Dec 12 13:02:19 localhost kernel: ACPI: bus type USB registered Dec 12 13:02:19 localhost kernel: usbcore: registered new interface driver usbfs Dec 12 13:02:19 localhost kernel: usbcore: registered new interface driver hub Dec 12 13:02:19 localhost kernel: usbcore: registered new device driver usb Dec 12 13:02:19 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Dec 12 13:02:19 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 12 13:02:19 localhost kernel: PTP clock support registered Dec 12 13:02:19 localhost kernel: EDAC MC: Ver: 3.0.0 Dec 12 13:02:19 localhost kernel: NetLabel: Initializing Dec 12 13:02:19 localhost kernel: NetLabel: domain hash size = 128 Dec 12 13:02:19 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Dec 12 13:02:19 localhost kernel: NetLabel: unlabeled traffic allowed by default Dec 12 13:02:19 localhost kernel: PCI: Using ACPI for IRQ routing Dec 12 13:02:19 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Dec 12 13:02:19 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 12 13:02:19 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 12 13:02:19 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 12 13:02:19 localhost kernel: vgaarb: loaded Dec 12 13:02:19 localhost kernel: clocksource: Switched to clocksource kvm-clock Dec 12 13:02:19 localhost kernel: VFS: Disk quotas dquot_6.6.0 Dec 12 13:02:19 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 12 13:02:19 localhost kernel: pnp: PnP ACPI init Dec 12 13:02:19 localhost kernel: pnp 00:03: [dma 2] Dec 12 13:02:19 localhost kernel: pnp: PnP ACPI: found 5 devices Dec 12 13:02:19 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 12 13:02:19 localhost kernel: NET: Registered PF_INET protocol family Dec 12 13:02:19 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 12 13:02:19 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 12 13:02:19 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 12 13:02:19 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 12 13:02:19 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 12 13:02:19 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 12 13:02:19 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Dec 12 13:02:19 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 12 13:02:19 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 12 13:02:19 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 12 13:02:19 localhost kernel: NET: Registered PF_XDP protocol family Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Dec 12 13:02:19 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Dec 12 13:02:19 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 12 13:02:19 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 12 13:02:19 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 12 13:02:19 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 111725 usecs Dec 12 13:02:19 localhost kernel: PCI: CLS 0 bytes, default 64 Dec 12 13:02:19 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 12 13:02:19 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Dec 12 13:02:19 localhost kernel: Trying to unpack rootfs image as initramfs... Dec 12 13:02:19 localhost kernel: ACPI: bus type thunderbolt registered Dec 12 13:02:19 localhost kernel: Initialise system trusted keyrings Dec 12 13:02:19 localhost kernel: Key type blacklist registered Dec 12 13:02:19 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Dec 12 13:02:19 localhost kernel: zbud: loaded Dec 12 13:02:19 localhost kernel: integrity: Platform Keyring initialized Dec 12 13:02:19 localhost kernel: integrity: Machine keyring initialized Dec 12 13:02:19 localhost kernel: Freeing initrd memory: 87820K Dec 12 13:02:19 localhost kernel: NET: Registered PF_ALG protocol family Dec 12 13:02:19 localhost kernel: xor: automatically using best checksumming function avx Dec 12 13:02:19 localhost kernel: Key type asymmetric registered Dec 12 13:02:19 localhost kernel: Asymmetric key parser 'x509' registered Dec 12 13:02:19 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Dec 12 13:02:19 localhost kernel: io scheduler mq-deadline registered Dec 12 13:02:19 localhost kernel: io scheduler kyber registered Dec 12 13:02:19 localhost kernel: io scheduler bfq registered Dec 12 13:02:19 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Dec 12 13:02:19 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Dec 12 13:02:19 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Dec 12 13:02:19 localhost kernel: ACPI: button: Power Button [PWRF] Dec 12 13:02:19 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 12 13:02:19 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 12 13:02:19 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 12 13:02:19 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 12 13:02:19 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 12 13:02:19 localhost kernel: Non-volatile memory driver v1.3 Dec 12 13:02:19 localhost kernel: rdac: device handler registered Dec 12 13:02:19 localhost kernel: hp_sw: device handler registered Dec 12 13:02:19 localhost kernel: emc: device handler registered Dec 12 13:02:19 localhost kernel: alua: device handler registered Dec 12 13:02:19 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 12 13:02:19 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 12 13:02:19 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 12 13:02:19 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Dec 12 13:02:19 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Dec 12 13:02:19 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Dec 12 13:02:19 localhost kernel: usb usb1: Product: UHCI Host Controller Dec 12 13:02:19 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-648.el9.x86_64 uhci_hcd Dec 12 13:02:19 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Dec 12 13:02:19 localhost kernel: hub 1-0:1.0: USB hub found Dec 12 13:02:19 localhost kernel: hub 1-0:1.0: 2 ports detected Dec 12 13:02:19 localhost kernel: usbcore: registered new interface driver usbserial_generic Dec 12 13:02:19 localhost kernel: usbserial: USB Serial support registered for generic Dec 12 13:02:19 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 12 13:02:19 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 12 13:02:19 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 12 13:02:19 localhost kernel: mousedev: PS/2 mouse device common for all mice Dec 12 13:02:19 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 12 13:02:19 localhost kernel: rtc_cmos 00:04: registered as rtc0 Dec 12 13:02:19 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Dec 12 13:02:19 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-12-12T18:02:18 UTC (1765562538) Dec 12 13:02:19 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 12 13:02:19 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Dec 12 13:02:19 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Dec 12 13:02:19 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Dec 12 13:02:19 localhost kernel: usbcore: registered new interface driver usbhid Dec 12 13:02:19 localhost kernel: usbhid: USB HID core driver Dec 12 13:02:19 localhost kernel: drop_monitor: Initializing network drop monitor service Dec 12 13:02:19 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Dec 12 13:02:19 localhost kernel: Initializing XFRM netlink socket Dec 12 13:02:19 localhost kernel: NET: Registered PF_INET6 protocol family Dec 12 13:02:19 localhost kernel: Segment Routing with IPv6 Dec 12 13:02:19 localhost kernel: NET: Registered PF_PACKET protocol family Dec 12 13:02:19 localhost kernel: mpls_gso: MPLS GSO support Dec 12 13:02:19 localhost kernel: IPI shorthand broadcast: enabled Dec 12 13:02:19 localhost kernel: AVX2 version of gcm_enc/dec engaged. Dec 12 13:02:19 localhost kernel: AES CTR mode by8 optimization enabled Dec 12 13:02:19 localhost kernel: sched_clock: Marking stable (1632023851, 143019661)->(1853689372, -78645860) Dec 12 13:02:19 localhost kernel: registered taskstats version 1 Dec 12 13:02:19 localhost kernel: Loading compiled-in X.509 certificates Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: bcc7fcdcfd9be61e8634554e9f7a1c01f32489d8' Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Dec 12 13:02:19 localhost kernel: Demotion targets for Node 0: null Dec 12 13:02:19 localhost kernel: page_owner is disabled Dec 12 13:02:19 localhost kernel: Key type .fscrypt registered Dec 12 13:02:19 localhost kernel: Key type fscrypt-provisioning registered Dec 12 13:02:19 localhost kernel: Key type big_key registered Dec 12 13:02:19 localhost kernel: Key type encrypted registered Dec 12 13:02:19 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Dec 12 13:02:19 localhost kernel: Loading compiled-in module X.509 certificates Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: bcc7fcdcfd9be61e8634554e9f7a1c01f32489d8' Dec 12 13:02:19 localhost kernel: ima: Allocated hash algorithm: sha256 Dec 12 13:02:19 localhost kernel: ima: No architecture policies found Dec 12 13:02:19 localhost kernel: evm: Initialising EVM extended attributes: Dec 12 13:02:19 localhost kernel: evm: security.selinux Dec 12 13:02:19 localhost kernel: evm: security.SMACK64 (disabled) Dec 12 13:02:19 localhost kernel: evm: security.SMACK64EXEC (disabled) Dec 12 13:02:19 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Dec 12 13:02:19 localhost kernel: evm: security.SMACK64MMAP (disabled) Dec 12 13:02:19 localhost kernel: evm: security.apparmor (disabled) Dec 12 13:02:19 localhost kernel: evm: security.ima Dec 12 13:02:19 localhost kernel: evm: security.capability Dec 12 13:02:19 localhost kernel: evm: HMAC attrs: 0x1 Dec 12 13:02:19 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Dec 12 13:02:19 localhost kernel: Running certificate verification RSA selftest Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Dec 12 13:02:19 localhost kernel: Running certificate verification ECDSA selftest Dec 12 13:02:19 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Dec 12 13:02:19 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Dec 12 13:02:19 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Dec 12 13:02:19 localhost kernel: usb 1-1: Product: QEMU USB Tablet Dec 12 13:02:19 localhost kernel: usb 1-1: Manufacturer: QEMU Dec 12 13:02:19 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Dec 12 13:02:19 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Dec 12 13:02:19 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Dec 12 13:02:19 localhost kernel: clk: Disabling unused clocks Dec 12 13:02:19 localhost kernel: Freeing unused decrypted memory: 2028K Dec 12 13:02:19 localhost kernel: Freeing unused kernel image (initmem) memory: 4192K Dec 12 13:02:19 localhost kernel: Write protecting the kernel read-only data: 30720k Dec 12 13:02:19 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 420K Dec 12 13:02:19 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Dec 12 13:02:19 localhost kernel: Run /init as init process Dec 12 13:02:19 localhost kernel: with arguments: Dec 12 13:02:19 localhost kernel: /init Dec 12 13:02:19 localhost kernel: with environment: Dec 12 13:02:19 localhost kernel: HOME=/ Dec 12 13:02:19 localhost kernel: TERM=linux Dec 12 13:02:19 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-648.el9.x86_64 Dec 12 13:02:19 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 12 13:02:19 localhost systemd[1]: Detected virtualization kvm. Dec 12 13:02:19 localhost systemd[1]: Detected architecture x86-64. Dec 12 13:02:19 localhost systemd[1]: Running in initrd. Dec 12 13:02:19 localhost systemd[1]: No hostname configured, using default hostname. Dec 12 13:02:19 localhost systemd[1]: Hostname set to . Dec 12 13:02:19 localhost systemd[1]: Initializing machine ID from VM UUID. Dec 12 13:02:19 localhost systemd[1]: Queued start job for default target Initrd Default Target. Dec 12 13:02:19 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 12 13:02:19 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 12 13:02:19 localhost systemd[1]: Reached target Initrd /usr File System. Dec 12 13:02:19 localhost systemd[1]: Reached target Local File Systems. Dec 12 13:02:19 localhost systemd[1]: Reached target Path Units. Dec 12 13:02:19 localhost systemd[1]: Reached target Slice Units. Dec 12 13:02:19 localhost systemd[1]: Reached target Swaps. Dec 12 13:02:19 localhost systemd[1]: Reached target Timer Units. Dec 12 13:02:19 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 12 13:02:19 localhost systemd[1]: Listening on Journal Socket (/dev/log). Dec 12 13:02:19 localhost systemd[1]: Listening on Journal Socket. Dec 12 13:02:19 localhost systemd[1]: Listening on udev Control Socket. Dec 12 13:02:19 localhost systemd[1]: Listening on udev Kernel Socket. Dec 12 13:02:19 localhost systemd[1]: Reached target Socket Units. Dec 12 13:02:19 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 12 13:02:19 localhost systemd[1]: Starting Journal Service... Dec 12 13:02:19 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Dec 12 13:02:19 localhost systemd[1]: Starting Apply Kernel Variables... Dec 12 13:02:19 localhost systemd[1]: Starting Create System Users... Dec 12 13:02:19 localhost systemd[1]: Starting Setup Virtual Console... Dec 12 13:02:19 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 12 13:02:19 localhost systemd[1]: Finished Apply Kernel Variables. Dec 12 13:02:19 localhost systemd[1]: Finished Create System Users. Dec 12 13:02:19 localhost systemd-journald[307]: Journal started Dec 12 13:02:19 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/c5dfbf49ac974a42a6cffa89aafb0bbe) is 8.0M, max 153.6M, 145.6M free. Dec 12 13:02:19 localhost systemd-sysusers[311]: Creating group 'users' with GID 100. Dec 12 13:02:19 localhost systemd-sysusers[311]: Creating group 'dbus' with GID 81. Dec 12 13:02:19 localhost systemd-sysusers[311]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Dec 12 13:02:19 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 12 13:02:19 localhost systemd[1]: Started Journal Service. Dec 12 13:02:19 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 12 13:02:19 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 12 13:02:19 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 12 13:02:19 localhost systemd[1]: Finished Setup Virtual Console. Dec 12 13:02:19 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Dec 12 13:02:19 localhost systemd[1]: Starting dracut cmdline hook... Dec 12 13:02:19 localhost dracut-cmdline[326]: dracut-9 dracut-057-102.git20250818.el9 Dec 12 13:02:19 localhost dracut-cmdline[326]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-648.el9.x86_64 root=UUID=cbdedf45-ed1d-4952-82a8-33a12c0ba266 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Dec 12 13:02:19 localhost systemd[1]: Finished dracut cmdline hook. Dec 12 13:02:19 localhost systemd[1]: Starting dracut pre-udev hook... Dec 12 13:02:19 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 12 13:02:19 localhost kernel: device-mapper: uevent: version 1.0.3 Dec 12 13:02:19 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Dec 12 13:02:19 localhost kernel: RPC: Registered named UNIX socket transport module. Dec 12 13:02:19 localhost kernel: RPC: Registered udp transport module. Dec 12 13:02:19 localhost kernel: RPC: Registered tcp transport module. Dec 12 13:02:19 localhost kernel: RPC: Registered tcp-with-tls transport module. Dec 12 13:02:19 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 12 13:02:20 localhost rpc.statd[443]: Version 2.5.4 starting Dec 12 13:02:20 localhost rpc.statd[443]: Initializing NSM state Dec 12 13:02:20 localhost rpc.idmapd[448]: Setting log level to 0 Dec 12 13:02:20 localhost systemd[1]: Finished dracut pre-udev hook. Dec 12 13:02:20 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 12 13:02:20 localhost systemd-udevd[461]: Using default interface naming scheme 'rhel-9.0'. Dec 12 13:02:20 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 12 13:02:20 localhost systemd[1]: Starting dracut pre-trigger hook... Dec 12 13:02:20 localhost systemd[1]: Finished dracut pre-trigger hook. Dec 12 13:02:20 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 12 13:02:20 localhost systemd[1]: Created slice Slice /system/modprobe. Dec 12 13:02:20 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 12 13:02:20 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 12 13:02:20 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 12 13:02:20 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 12 13:02:20 localhost systemd[1]: Mounting Kernel Configuration File System... Dec 12 13:02:20 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 12 13:02:20 localhost systemd[1]: Reached target Network. Dec 12 13:02:20 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 12 13:02:20 localhost systemd[1]: Starting dracut initqueue hook... Dec 12 13:02:20 localhost systemd[1]: Mounted Kernel Configuration File System. Dec 12 13:02:20 localhost systemd[1]: Reached target System Initialization. Dec 12 13:02:20 localhost systemd[1]: Reached target Basic System. Dec 12 13:02:20 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Dec 12 13:02:20 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Dec 12 13:02:20 localhost kernel: libata version 3.00 loaded. Dec 12 13:02:20 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Dec 12 13:02:20 localhost kernel: scsi host0: ata_piix Dec 12 13:02:20 localhost kernel: scsi host1: ata_piix Dec 12 13:02:20 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Dec 12 13:02:20 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Dec 12 13:02:20 localhost kernel: vda: vda1 Dec 12 13:02:20 localhost kernel: ata1: found unknown device (class 0) Dec 12 13:02:20 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 12 13:02:20 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 12 13:02:20 localhost systemd-udevd[498]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:02:20 localhost systemd[1]: Found device /dev/disk/by-uuid/cbdedf45-ed1d-4952-82a8-33a12c0ba266. Dec 12 13:02:20 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Dec 12 13:02:20 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 12 13:02:20 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 12 13:02:20 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Dec 12 13:02:20 localhost systemd[1]: Reached target Initrd Root Device. Dec 12 13:02:20 localhost systemd[1]: Finished dracut initqueue hook. Dec 12 13:02:20 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 12 13:02:20 localhost systemd[1]: Reached target Remote Encrypted Volumes. Dec 12 13:02:20 localhost systemd[1]: Reached target Remote File Systems. Dec 12 13:02:20 localhost systemd[1]: Starting dracut pre-mount hook... Dec 12 13:02:20 localhost systemd[1]: Finished dracut pre-mount hook. Dec 12 13:02:20 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/cbdedf45-ed1d-4952-82a8-33a12c0ba266... Dec 12 13:02:20 localhost systemd-fsck[556]: /usr/sbin/fsck.xfs: XFS file system. Dec 12 13:02:20 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/cbdedf45-ed1d-4952-82a8-33a12c0ba266. Dec 12 13:02:20 localhost systemd[1]: Mounting /sysroot... Dec 12 13:02:21 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Dec 12 13:02:21 localhost kernel: XFS (vda1): Mounting V5 Filesystem cbdedf45-ed1d-4952-82a8-33a12c0ba266 Dec 12 13:02:21 localhost kernel: XFS (vda1): Ending clean mount Dec 12 13:02:21 localhost systemd[1]: Mounted /sysroot. Dec 12 13:02:21 localhost systemd[1]: Reached target Initrd Root File System. Dec 12 13:02:21 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Dec 12 13:02:21 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Dec 12 13:02:21 localhost systemd[1]: Reached target Initrd File Systems. Dec 12 13:02:21 localhost systemd[1]: Reached target Initrd Default Target. Dec 12 13:02:21 localhost systemd[1]: Starting dracut mount hook... Dec 12 13:02:21 localhost systemd[1]: Finished dracut mount hook. Dec 12 13:02:21 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Dec 12 13:02:21 localhost rpc.idmapd[448]: exiting on signal 15 Dec 12 13:02:21 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Dec 12 13:02:21 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Dec 12 13:02:21 localhost systemd[1]: Stopped target Network. Dec 12 13:02:21 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Dec 12 13:02:21 localhost systemd[1]: Stopped target Timer Units. Dec 12 13:02:21 localhost systemd[1]: dbus.socket: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Dec 12 13:02:21 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Dec 12 13:02:21 localhost systemd[1]: Stopped target Initrd Default Target. Dec 12 13:02:21 localhost systemd[1]: Stopped target Basic System. Dec 12 13:02:21 localhost systemd[1]: Stopped target Initrd Root Device. Dec 12 13:02:21 localhost systemd[1]: Stopped target Initrd /usr File System. Dec 12 13:02:21 localhost systemd[1]: Stopped target Path Units. Dec 12 13:02:21 localhost systemd[1]: Stopped target Remote File Systems. Dec 12 13:02:21 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Dec 12 13:02:21 localhost systemd[1]: Stopped target Slice Units. Dec 12 13:02:21 localhost systemd[1]: Stopped target Socket Units. Dec 12 13:02:21 localhost systemd[1]: Stopped target System Initialization. Dec 12 13:02:21 localhost systemd[1]: Stopped target Local File Systems. Dec 12 13:02:21 localhost systemd[1]: Stopped target Swaps. Dec 12 13:02:21 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut mount hook. Dec 12 13:02:21 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut pre-mount hook. Dec 12 13:02:21 localhost systemd[1]: Stopped target Local Encrypted Volumes. Dec 12 13:02:21 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Dec 12 13:02:21 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut initqueue hook. Dec 12 13:02:21 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 12 13:02:21 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Create Volatile Files and Directories. Dec 12 13:02:21 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Coldplug All udev Devices. Dec 12 13:02:21 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut pre-trigger hook. Dec 12 13:02:21 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Dec 12 13:02:21 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Setup Virtual Console. Dec 12 13:02:21 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Dec 12 13:02:21 localhost systemd[1]: systemd-udevd.service: Consumed 1.054s CPU time. Dec 12 13:02:21 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Closed udev Control Socket. Dec 12 13:02:21 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Closed udev Kernel Socket. Dec 12 13:02:21 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut pre-udev hook. Dec 12 13:02:21 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped dracut cmdline hook. Dec 12 13:02:21 localhost systemd[1]: Starting Cleanup udev Database... Dec 12 13:02:21 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Dec 12 13:02:21 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Create List of Static Device Nodes. Dec 12 13:02:21 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Stopped Create System Users. Dec 12 13:02:21 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Dec 12 13:02:21 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 12 13:02:21 localhost systemd[1]: Finished Cleanup udev Database. Dec 12 13:02:21 localhost systemd[1]: Reached target Switch Root. Dec 12 13:02:21 localhost systemd[1]: Starting Switch Root... Dec 12 13:02:21 localhost systemd[1]: Switching root. Dec 12 13:02:21 localhost systemd-journald[307]: Journal stopped Dec 12 13:02:22 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Dec 12 13:02:22 localhost kernel: audit: type=1404 audit(1765562542.092:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability open_perms=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability always_check_network=0 Dec 12 13:02:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:02:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:02:22 localhost kernel: audit: type=1403 audit(1765562542.217:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 12 13:02:22 localhost systemd[1]: Successfully loaded SELinux policy in 127.511ms. Dec 12 13:02:22 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.230ms. Dec 12 13:02:22 localhost systemd[1]: systemd 252-59.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 12 13:02:22 localhost systemd[1]: Detected virtualization kvm. Dec 12 13:02:22 localhost systemd[1]: Detected architecture x86-64. Dec 12 13:02:22 localhost systemd-rc-local-generator[637]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:02:22 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Stopped Switch Root. Dec 12 13:02:22 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 12 13:02:22 localhost systemd[1]: Created slice Slice /system/getty. Dec 12 13:02:22 localhost systemd[1]: Created slice Slice /system/serial-getty. Dec 12 13:02:22 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Dec 12 13:02:22 localhost systemd[1]: Created slice User and Session Slice. Dec 12 13:02:22 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 12 13:02:22 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Dec 12 13:02:22 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Dec 12 13:02:22 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 12 13:02:22 localhost systemd[1]: Stopped target Switch Root. Dec 12 13:02:22 localhost systemd[1]: Stopped target Initrd File Systems. Dec 12 13:02:22 localhost systemd[1]: Stopped target Initrd Root File System. Dec 12 13:02:22 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Dec 12 13:02:22 localhost systemd[1]: Reached target Path Units. Dec 12 13:02:22 localhost systemd[1]: Reached target rpc_pipefs.target. Dec 12 13:02:22 localhost systemd[1]: Reached target Slice Units. Dec 12 13:02:22 localhost systemd[1]: Reached target Swaps. Dec 12 13:02:22 localhost systemd[1]: Reached target Local Verity Protected Volumes. Dec 12 13:02:22 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Dec 12 13:02:22 localhost systemd[1]: Reached target RPC Port Mapper. Dec 12 13:02:22 localhost systemd[1]: Listening on Process Core Dump Socket. Dec 12 13:02:22 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Dec 12 13:02:22 localhost systemd[1]: Listening on udev Control Socket. Dec 12 13:02:22 localhost systemd[1]: Listening on udev Kernel Socket. Dec 12 13:02:22 localhost systemd[1]: Mounting Huge Pages File System... Dec 12 13:02:22 localhost systemd[1]: Mounting POSIX Message Queue File System... Dec 12 13:02:22 localhost systemd[1]: Mounting Kernel Debug File System... Dec 12 13:02:22 localhost systemd[1]: Mounting Kernel Trace File System... Dec 12 13:02:22 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 12 13:02:22 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 12 13:02:22 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 12 13:02:22 localhost systemd[1]: Starting Load Kernel Module drm... Dec 12 13:02:22 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Dec 12 13:02:22 localhost systemd[1]: Starting Load Kernel Module fuse... Dec 12 13:02:22 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 12 13:02:22 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Stopped File System Check on Root Device. Dec 12 13:02:22 localhost systemd[1]: Stopped Journal Service. Dec 12 13:02:22 localhost systemd[1]: Starting Journal Service... Dec 12 13:02:22 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Dec 12 13:02:22 localhost systemd[1]: Starting Generate network units from Kernel command line... Dec 12 13:02:22 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 12 13:02:22 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Dec 12 13:02:22 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Dec 12 13:02:22 localhost systemd[1]: Starting Apply Kernel Variables... Dec 12 13:02:22 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Dec 12 13:02:22 localhost kernel: fuse: init (API version 7.37) Dec 12 13:02:22 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 12 13:02:22 localhost systemd[1]: Mounted Huge Pages File System. Dec 12 13:02:22 localhost systemd[1]: Mounted POSIX Message Queue File System. Dec 12 13:02:22 localhost systemd[1]: Mounted Kernel Debug File System. Dec 12 13:02:22 localhost systemd[1]: Mounted Kernel Trace File System. Dec 12 13:02:22 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 12 13:02:22 localhost kernel: ACPI: bus type drm_connector registered Dec 12 13:02:22 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 12 13:02:22 localhost systemd-journald[678]: Journal started Dec 12 13:02:22 localhost systemd-journald[678]: Runtime Journal (/run/log/journal/64f1d6692049d8be5e8b216cc203502c) is 8.0M, max 153.6M, 145.6M free. Dec 12 13:02:22 localhost systemd[1]: Queued start job for default target Multi-User System. Dec 12 13:02:22 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Started Journal Service. Dec 12 13:02:22 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Finished Load Kernel Module drm. Dec 12 13:02:22 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Dec 12 13:02:22 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 12 13:02:22 localhost systemd[1]: Finished Load Kernel Module fuse. Dec 12 13:02:22 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 12 13:02:22 localhost systemd[1]: Finished Generate network units from Kernel command line. Dec 12 13:02:22 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Dec 12 13:02:22 localhost systemd[1]: Finished Apply Kernel Variables. Dec 12 13:02:22 localhost systemd[1]: Mounting FUSE Control File System... Dec 12 13:02:22 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 12 13:02:22 localhost systemd[1]: Starting Rebuild Hardware Database... Dec 12 13:02:22 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Dec 12 13:02:22 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 12 13:02:22 localhost systemd[1]: Starting Load/Save OS Random Seed... Dec 12 13:02:22 localhost systemd[1]: Starting Create System Users... Dec 12 13:02:22 localhost systemd[1]: Mounted FUSE Control File System. Dec 12 13:02:22 localhost systemd-journald[678]: Runtime Journal (/run/log/journal/64f1d6692049d8be5e8b216cc203502c) is 8.0M, max 153.6M, 145.6M free. Dec 12 13:02:22 localhost systemd-journald[678]: Received client request to flush runtime journal. Dec 12 13:02:22 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Dec 12 13:02:22 localhost systemd[1]: Finished Load/Save OS Random Seed. Dec 12 13:02:22 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 12 13:02:22 localhost systemd[1]: Finished Create System Users. Dec 12 13:02:22 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 12 13:02:22 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 12 13:02:23 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 12 13:02:23 localhost systemd[1]: Reached target Preparation for Local File Systems. Dec 12 13:02:23 localhost systemd[1]: Reached target Local File Systems. Dec 12 13:02:23 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Dec 12 13:02:23 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Dec 12 13:02:23 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Dec 12 13:02:23 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Dec 12 13:02:23 localhost systemd[1]: Starting Automatic Boot Loader Update... Dec 12 13:02:23 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Dec 12 13:02:23 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 12 13:02:23 localhost bootctl[695]: Couldn't find EFI system partition, skipping. Dec 12 13:02:23 localhost systemd[1]: Finished Automatic Boot Loader Update. Dec 12 13:02:23 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 12 13:02:23 localhost systemd[1]: Starting Security Auditing Service... Dec 12 13:02:23 localhost systemd[1]: Starting RPC Bind... Dec 12 13:02:23 localhost systemd[1]: Starting Rebuild Journal Catalog... Dec 12 13:02:23 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Dec 12 13:02:23 localhost auditd[701]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Dec 12 13:02:23 localhost auditd[701]: Init complete, auditd 3.1.5 listening for events (startup state enable) Dec 12 13:02:23 localhost systemd[1]: Started RPC Bind. Dec 12 13:02:23 localhost systemd[1]: Finished Rebuild Journal Catalog. Dec 12 13:02:23 localhost augenrules[706]: /sbin/augenrules: No change Dec 12 13:02:23 localhost augenrules[721]: No rules Dec 12 13:02:23 localhost augenrules[721]: enabled 1 Dec 12 13:02:23 localhost augenrules[721]: failure 1 Dec 12 13:02:23 localhost augenrules[721]: pid 701 Dec 12 13:02:23 localhost augenrules[721]: rate_limit 0 Dec 12 13:02:23 localhost augenrules[721]: backlog_limit 8192 Dec 12 13:02:23 localhost augenrules[721]: lost 0 Dec 12 13:02:23 localhost augenrules[721]: backlog 4 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time 60000 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time_actual 0 Dec 12 13:02:23 localhost augenrules[721]: enabled 1 Dec 12 13:02:23 localhost augenrules[721]: failure 1 Dec 12 13:02:23 localhost augenrules[721]: pid 701 Dec 12 13:02:23 localhost augenrules[721]: rate_limit 0 Dec 12 13:02:23 localhost augenrules[721]: backlog_limit 8192 Dec 12 13:02:23 localhost augenrules[721]: lost 0 Dec 12 13:02:23 localhost augenrules[721]: backlog 4 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time 60000 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time_actual 0 Dec 12 13:02:23 localhost augenrules[721]: enabled 1 Dec 12 13:02:23 localhost augenrules[721]: failure 1 Dec 12 13:02:23 localhost augenrules[721]: pid 701 Dec 12 13:02:23 localhost augenrules[721]: rate_limit 0 Dec 12 13:02:23 localhost augenrules[721]: backlog_limit 8192 Dec 12 13:02:23 localhost augenrules[721]: lost 0 Dec 12 13:02:23 localhost augenrules[721]: backlog 8 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time 60000 Dec 12 13:02:23 localhost augenrules[721]: backlog_wait_time_actual 0 Dec 12 13:02:23 localhost systemd[1]: Started Security Auditing Service. Dec 12 13:02:23 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Dec 12 13:02:23 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Dec 12 13:02:23 localhost systemd[1]: Finished Rebuild Hardware Database. Dec 12 13:02:23 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 12 13:02:23 localhost systemd[1]: Starting Update is Completed... Dec 12 13:02:23 localhost systemd[1]: Finished Update is Completed. Dec 12 13:02:23 localhost systemd-udevd[729]: Using default interface naming scheme 'rhel-9.0'. Dec 12 13:02:23 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 12 13:02:23 localhost systemd[1]: Reached target System Initialization. Dec 12 13:02:23 localhost systemd[1]: Started dnf makecache --timer. Dec 12 13:02:23 localhost systemd[1]: Started Daily rotation of log files. Dec 12 13:02:23 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Dec 12 13:02:23 localhost systemd[1]: Reached target Timer Units. Dec 12 13:02:23 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 12 13:02:23 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Dec 12 13:02:23 localhost systemd[1]: Reached target Socket Units. Dec 12 13:02:23 localhost systemd[1]: Starting D-Bus System Message Bus... Dec 12 13:02:23 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 12 13:02:23 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Dec 12 13:02:23 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 12 13:02:23 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 12 13:02:23 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 12 13:02:23 localhost systemd[1]: Started D-Bus System Message Bus. Dec 12 13:02:23 localhost systemd[1]: Reached target Basic System. Dec 12 13:02:23 localhost systemd-udevd[743]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:02:23 localhost dbus-broker-lau[752]: Ready Dec 12 13:02:23 localhost systemd[1]: Starting NTP client/server... Dec 12 13:02:23 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Dec 12 13:02:23 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Dec 12 13:02:23 localhost systemd[1]: Starting IPv4 firewall with iptables... Dec 12 13:02:23 localhost systemd[1]: Started irqbalance daemon. Dec 12 13:02:23 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Dec 12 13:02:23 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:02:23 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:02:23 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:02:23 localhost systemd[1]: Reached target sshd-keygen.target. Dec 12 13:02:23 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Dec 12 13:02:23 localhost systemd[1]: Reached target User and Group Name Lookups. Dec 12 13:02:23 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Dec 12 13:02:23 localhost chronyd[791]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Dec 12 13:02:23 localhost chronyd[791]: Loaded 0 symmetric keys Dec 12 13:02:23 localhost chronyd[791]: Using right/UTC timezone to obtain leap second data Dec 12 13:02:23 localhost chronyd[791]: Loaded seccomp filter (level 2) Dec 12 13:02:23 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 12 13:02:23 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 12 13:02:23 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 12 13:02:23 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Dec 12 13:02:23 localhost systemd[1]: Starting User Login Management... Dec 12 13:02:23 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Dec 12 13:02:23 localhost systemd[1]: Started NTP client/server. Dec 12 13:02:23 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Dec 12 13:02:23 localhost systemd-logind[795]: Watching system buttons on /dev/input/event0 (Power Button) Dec 12 13:02:23 localhost systemd-logind[795]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 12 13:02:23 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Dec 12 13:02:23 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Dec 12 13:02:23 localhost systemd-logind[795]: New seat seat0. Dec 12 13:02:23 localhost systemd[1]: Started User Login Management. Dec 12 13:02:23 localhost kernel: Console: switching to colour dummy device 80x25 Dec 12 13:02:23 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Dec 12 13:02:23 localhost kernel: [drm] features: -context_init Dec 12 13:02:23 localhost kernel: [drm] number of scanouts: 1 Dec 12 13:02:23 localhost kernel: [drm] number of cap sets: 0 Dec 12 13:02:23 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Dec 12 13:02:23 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Dec 12 13:02:23 localhost kernel: Console: switching to colour frame buffer device 128x48 Dec 12 13:02:23 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Dec 12 13:02:23 localhost kernel: kvm_amd: TSC scaling supported Dec 12 13:02:23 localhost kernel: kvm_amd: Nested Virtualization enabled Dec 12 13:02:23 localhost kernel: kvm_amd: Nested Paging enabled Dec 12 13:02:23 localhost kernel: kvm_amd: LBR virtualization supported Dec 12 13:02:23 localhost iptables.init[779]: iptables: Applying firewall rules: [ OK ] Dec 12 13:02:23 localhost systemd[1]: Finished IPv4 firewall with iptables. Dec 12 13:02:24 localhost cloud-init[840]: Cloud-init v. 24.4-7.el9 running 'init-local' at Fri, 12 Dec 2025 18:02:24 +0000. Up 7.21 seconds. Dec 12 13:02:24 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Dec 12 13:02:24 localhost kernel: ISO 9660 Extensions: RRIP_1991A Dec 12 13:02:24 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp87k5sole.mount: Deactivated successfully. Dec 12 13:02:24 localhost systemd[1]: Starting Hostname Service... Dec 12 13:02:24 localhost systemd[1]: Started Hostname Service. Dec 12 13:02:24 np0005557561.novalocal systemd-hostnamed[854]: Hostname set to (static) Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Reached target Preparation for Network. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Starting Network Manager... Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.7861] NetworkManager (version 1.54.2-1.el9) is starting... (boot:157dcfed-ab9e-48aa-b7fb-cc591a252e39) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.7869] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.7990] manager[0x556f23c17000]: monitoring kernel firmware directory '/lib/firmware'. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8050] hostname: hostname: using hostnamed Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8051] hostname: static hostname changed from (none) to "np0005557561.novalocal" Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8058] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8233] manager[0x556f23c17000]: rfkill: Wi-Fi hardware radio set enabled Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8233] manager[0x556f23c17000]: rfkill: WWAN hardware radio set enabled Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8296] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.2-1.el9/libnm-device-plugin-team.so) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8298] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8299] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8299] manager: Networking is enabled by state file Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8302] settings: Loaded settings plugin: keyfile (internal) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8320] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8349] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8367] dhcp: init: Using DHCP client 'internal' Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8372] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8395] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8406] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8419] device (lo): Activation: starting connection 'lo' (47338041-664f-4fa9-a674-b5f36ddf6ef5) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8434] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8440] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8480] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8487] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8493] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Started Network Manager. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8496] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8501] device (eth0): carrier: link connected Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8508] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Reached target Network. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8519] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8532] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8539] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8540] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8544] manager: NetworkManager state is now CONNECTING Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Starting Network Manager Wait Online... Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8546] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8563] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8569] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8610] dhcp4 (eth0): state changed new lease, address=38.102.83.66 Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8624] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8655] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8673] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8676] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8687] device (lo): Activation: successful, device activated. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8700] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8704] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8711] manager: NetworkManager state is now CONNECTED_SITE Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8715] device (eth0): Activation: successful, device activated. Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8724] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 12 13:02:24 np0005557561.novalocal NetworkManager[858]: [1765562544.8729] manager: startup complete Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Reached target NFS client services. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Reached target Remote File Systems. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Finished Network Manager Wait Online. Dec 12 13:02:24 np0005557561.novalocal systemd[1]: Starting Cloud-init: Network Stage... Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: Cloud-init v. 24.4-7.el9 running 'init' at Fri, 12 Dec 2025 18:02:25 +0000. Up 8.28 seconds. Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: ++++++++++++++++++++++++++++++++++++++Net device info++++++++++++++++++++++++++++++++++++++ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +--------+------+----------------------------+---------------+--------+-------------------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +--------+------+----------------------------+---------------+--------+-------------------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | eth0 | True | 38.102.83.66 | 255.255.255.0 | global | fa:16:3e:3f:00:a8 | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | eth0 | True | fe80::f816:3eff:fe3f:a8/64 | . | link | fa:16:3e:3f:00:a8 | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | lo | True | ::1/128 | . | host | . | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +--------+------+----------------------------+---------------+--------+-------------------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | Route | Destination | Gateway | Interface | Flags | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: | 3 | multicast | :: | eth0 | U | Dec 12 13:02:25 np0005557561.novalocal cloud-init[923]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 12 13:02:26 np0005557561.novalocal useradd[989]: new group: name=cloud-user, GID=1001 Dec 12 13:02:26 np0005557561.novalocal useradd[989]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Dec 12 13:02:26 np0005557561.novalocal useradd[989]: add 'cloud-user' to group 'adm' Dec 12 13:02:26 np0005557561.novalocal useradd[989]: add 'cloud-user' to group 'systemd-journal' Dec 12 13:02:26 np0005557561.novalocal useradd[989]: add 'cloud-user' to shadow group 'adm' Dec 12 13:02:26 np0005557561.novalocal useradd[989]: add 'cloud-user' to shadow group 'systemd-journal' Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Generating public/private rsa key pair. Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key fingerprint is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: SHA256:RC8zxokFkInrtflw+t02DGsKN+l0IvH8cLaqvfaNXwM root@np0005557561.novalocal Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key's randomart image is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +---[RSA 3072]----+ Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | ..+..o | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . o = o | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . . O . | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . . o + | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . ..o S E | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . ++... . | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | o=X ++ o | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .BoXo=+. . | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .+B**o+. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +----[SHA256]-----+ Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Generating public/private ecdsa key pair. Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key fingerprint is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: SHA256:BAPbHUc+2lVtbvtysmCfDxmHlsMi5hOaE+jBN2IQYAs root@np0005557561.novalocal Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key's randomart image is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +---[ECDSA 256]---+ Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: |E o.o.o ..o .. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | o . + + + . o| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . o . o o . o | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | o o o o . oo| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | * S = . B.o| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | o + B o o * | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . + o o o .| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . o oooo| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | +*.| Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +----[SHA256]-----+ Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Generating public/private ed25519 key pair. Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key fingerprint is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: SHA256:+tePqD62T4wenorF6mozTXPlOaiOqlXEfwhlFoVJu5Y root@np0005557561.novalocal Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: The key's randomart image is: Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +--[ED25519 256]--+ Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .*=. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . +o. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | + . | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . o +. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | . E+S. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .oooo+o | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .o ++ o.o. | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: | .+.o+ +o+.... | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: |+oo*= .+O*o ... | Dec 12 13:02:26 np0005557561.novalocal cloud-init[923]: +----[SHA256]-----+ Dec 12 13:02:26 np0005557561.novalocal sm-notify[1005]: Version 2.5.4 starting Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Finished Cloud-init: Network Stage. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Reached target Cloud-config availability. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Reached target Network is Online. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting Cloud-init: Config Stage... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting Crash recovery kernel arming... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting Notify NFS peers of a restart... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting System Logging Service... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting OpenSSH server daemon... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting Permit User Sessions... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started Notify NFS peers of a restart. Dec 12 13:02:26 np0005557561.novalocal sshd[1007]: Server listening on 0.0.0.0 port 22. Dec 12 13:02:26 np0005557561.novalocal sshd[1007]: Server listening on :: port 22. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started OpenSSH server daemon. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Finished Permit User Sessions. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started Command Scheduler. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started Getty on tty1. Dec 12 13:02:26 np0005557561.novalocal crond[1010]: (CRON) STARTUP (1.5.7) Dec 12 13:02:26 np0005557561.novalocal crond[1010]: (CRON) INFO (Syslog will be used instead of sendmail.) Dec 12 13:02:26 np0005557561.novalocal crond[1010]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 58% if used.) Dec 12 13:02:26 np0005557561.novalocal crond[1010]: (CRON) INFO (running with inotify support) Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started Serial Getty on ttyS0. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Reached target Login Prompts. Dec 12 13:02:26 np0005557561.novalocal rsyslogd[1006]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1006" x-info="https://www.rsyslog.com"] start Dec 12 13:02:26 np0005557561.novalocal rsyslogd[1006]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Started System Logging Service. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Reached target Multi-User System. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Dec 12 13:02:26 np0005557561.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 12 13:02:26 np0005557561.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Dec 12 13:02:26 np0005557561.novalocal rsyslogd[1006]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Dec 12 13:02:27 np0005557561.novalocal kdumpctl[1018]: kdump: No kdump initial ramdisk found. Dec 12 13:02:27 np0005557561.novalocal kdumpctl[1018]: kdump: Rebuilding /boot/initramfs-5.14.0-648.el9.x86_64kdump.img Dec 12 13:02:27 np0005557561.novalocal cloud-init[1092]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Fri, 12 Dec 2025 18:02:27 +0000. Up 10.18 seconds. Dec 12 13:02:27 np0005557561.novalocal systemd[1]: Finished Cloud-init: Config Stage. Dec 12 13:02:27 np0005557561.novalocal systemd[1]: Starting Cloud-init: Final Stage... Dec 12 13:02:27 np0005557561.novalocal sshd-session[1148]: Unable to negotiate with 38.102.83.114 port 42580: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1162]: Unable to negotiate with 38.102.83.114 port 42596: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1170]: Unable to negotiate with 38.102.83.114 port 42608: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1140]: Connection closed by 38.102.83.114 port 42578 [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1183]: Connection reset by 38.102.83.114 port 42622 [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1153]: Connection closed by 38.102.83.114 port 42582 [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1210]: Unable to negotiate with 38.102.83.114 port 42640: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1222]: Unable to negotiate with 38.102.83.114 port 42650: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Dec 12 13:02:27 np0005557561.novalocal sshd-session[1195]: Connection closed by 38.102.83.114 port 42636 [preauth] Dec 12 13:02:27 np0005557561.novalocal cloud-init[1257]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Fri, 12 Dec 2025 18:02:27 +0000. Up 10.61 seconds. Dec 12 13:02:27 np0005557561.novalocal cloud-init[1287]: ############################################################# Dec 12 13:02:27 np0005557561.novalocal cloud-init[1288]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Dec 12 13:02:27 np0005557561.novalocal cloud-init[1292]: 256 SHA256:BAPbHUc+2lVtbvtysmCfDxmHlsMi5hOaE+jBN2IQYAs root@np0005557561.novalocal (ECDSA) Dec 12 13:02:27 np0005557561.novalocal dracut[1291]: dracut-057-102.git20250818.el9 Dec 12 13:02:27 np0005557561.novalocal cloud-init[1296]: 256 SHA256:+tePqD62T4wenorF6mozTXPlOaiOqlXEfwhlFoVJu5Y root@np0005557561.novalocal (ED25519) Dec 12 13:02:27 np0005557561.novalocal cloud-init[1299]: 3072 SHA256:RC8zxokFkInrtflw+t02DGsKN+l0IvH8cLaqvfaNXwM root@np0005557561.novalocal (RSA) Dec 12 13:02:27 np0005557561.novalocal cloud-init[1301]: -----END SSH HOST KEY FINGERPRINTS----- Dec 12 13:02:27 np0005557561.novalocal cloud-init[1305]: ############################################################# Dec 12 13:02:27 np0005557561.novalocal cloud-init[1257]: Cloud-init v. 24.4-7.el9 finished at Fri, 12 Dec 2025 18:02:27 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.81 seconds Dec 12 13:02:27 np0005557561.novalocal systemd[1]: Finished Cloud-init: Final Stage. Dec 12 13:02:27 np0005557561.novalocal systemd[1]: Reached target Cloud-init target. Dec 12 13:02:27 np0005557561.novalocal dracut[1295]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/cbdedf45-ed1d-4952-82a8-33a12c0ba266 /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-648.el9.x86_64kdump.img 5.14.0-648.el9.x86_64 Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 12 13:02:28 np0005557561.novalocal dracut[1295]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: Module 'resume' will not be installed, because it's in the list to be omitted! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: memstrack is not available Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: memstrack is not available Dec 12 13:02:29 np0005557561.novalocal dracut[1295]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 12 13:02:29 np0005557561.novalocal chronyd[791]: Selected source 149.56.19.163 (2.centos.pool.ntp.org) Dec 12 13:02:29 np0005557561.novalocal chronyd[791]: System clock wrong by 1.497965 seconds Dec 12 13:02:31 np0005557561.novalocal chronyd[791]: System clock was stepped by 1.497965 seconds Dec 12 13:02:31 np0005557561.novalocal chronyd[791]: System clock TAI offset set to 37 seconds Dec 12 13:02:31 np0005557561.novalocal dracut[1295]: *** Including module: systemd *** Dec 12 13:02:31 np0005557561.novalocal dracut[1295]: *** Including module: fips *** Dec 12 13:02:32 np0005557561.novalocal dracut[1295]: *** Including module: systemd-initrd *** Dec 12 13:02:32 np0005557561.novalocal dracut[1295]: *** Including module: i18n *** Dec 12 13:02:32 np0005557561.novalocal dracut[1295]: *** Including module: drm *** Dec 12 13:02:32 np0005557561.novalocal chronyd[791]: Selected source 138.197.164.54 (2.centos.pool.ntp.org) Dec 12 13:02:32 np0005557561.novalocal dracut[1295]: *** Including module: prefixdevname *** Dec 12 13:02:32 np0005557561.novalocal dracut[1295]: *** Including module: kernel-modules *** Dec 12 13:02:32 np0005557561.novalocal kernel: block vda: the capability attribute has been deprecated. Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: kernel-modules-extra *** Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: qemu *** Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: fstab-sys *** Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: rootfs-block *** Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: terminfo *** Dec 12 13:02:33 np0005557561.novalocal dracut[1295]: *** Including module: udev-rules *** Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: Skipping udev rule: 91-permissions.rules Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: Skipping udev rule: 80-drivers-modprobe.rules Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: *** Including module: virtiofs *** Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: *** Including module: dracut-systemd *** Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: *** Including module: usrmount *** Dec 12 13:02:34 np0005557561.novalocal dracut[1295]: *** Including module: base *** Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: *** Including module: fs-lib *** Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: *** Including module: kdumpbase *** Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 25 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 25 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 31 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 31 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 28 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 28 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 32 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 32 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 30 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 30 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 29 affinity: Operation not permitted Dec 12 13:02:35 np0005557561.novalocal irqbalance[781]: IRQ 29 affinity is now unmanaged Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: *** Including module: microcode_ctl-fw_dir_override *** Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl module: mangling fw_dir Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel" is ignored Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-2d-07" is ignored Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-4e-03" is ignored Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-4f-01" is ignored Dec 12 13:02:35 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-55-04" is ignored Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-5e-03" is ignored Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-8c-01" is ignored Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: configuration "intel-06-8f-08" is ignored Dec 12 13:02:36 np0005557561.novalocal sshd-session[3009]: Accepted publickey for zuul-worker from 38.102.83.114 port 51300 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: *** Including module: openssl *** Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Created slice User Slice of UID 1000. Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Dec 12 13:02:36 np0005557561.novalocal systemd-logind[795]: New session 1 of user zuul-worker. Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: *** Including module: shutdown *** Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Starting User Manager for UID 1000... Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: *** Including module: squash *** Dec 12 13:02:36 np0005557561.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: *** Including modules done *** Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Queued start job for default target Main User Target. Dec 12 13:02:36 np0005557561.novalocal dracut[1295]: *** Installing kernel module dependencies *** Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Created slice User Application Slice. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Started Mark boot as successful after the user session has run 2 minutes. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Started Daily Cleanup of User's Temporary Directories. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Reached target Paths. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Reached target Timers. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Starting D-Bus User Message Bus Socket... Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Starting Create User's Volatile Files and Directories... Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Listening on D-Bus User Message Bus Socket. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Reached target Sockets. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Finished Create User's Volatile Files and Directories. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Reached target Basic System. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Reached target Main User Target. Dec 12 13:02:36 np0005557561.novalocal systemd[3067]: Startup finished in 126ms. Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Started User Manager for UID 1000. Dec 12 13:02:36 np0005557561.novalocal systemd[1]: Started Session 1 of User zuul-worker. Dec 12 13:02:36 np0005557561.novalocal sshd-session[3009]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 12 13:02:37 np0005557561.novalocal python3[3205]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 12 13:02:37 np0005557561.novalocal dracut[1295]: *** Installing kernel module dependencies done *** Dec 12 13:02:37 np0005557561.novalocal dracut[1295]: *** Resolving executable dependencies *** Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: *** Resolving executable dependencies done *** Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: *** Generating early-microcode cpio image *** Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: *** Store current command line parameters *** Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: Stored kernel commandline: Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: No dracut internal kernel commandline stored in the initramfs Dec 12 13:02:39 np0005557561.novalocal dracut[1295]: *** Install squash loader *** Dec 12 13:02:39 np0005557561.novalocal python3[4019]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 12 13:02:40 np0005557561.novalocal dracut[1295]: *** Squashing the files inside the initramfs *** Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: *** Squashing the files inside the initramfs done *** Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: *** Creating image file '/boot/initramfs-5.14.0-648.el9.x86_64kdump.img' *** Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: *** Hardlinking files *** Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Mode: real Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Files: 50 Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Linked: 0 files Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Compared: 0 xattrs Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Compared: 0 files Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Saved: 0 B Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: Duration: 0.000888 seconds Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: *** Hardlinking files done *** Dec 12 13:02:41 np0005557561.novalocal dracut[1295]: *** Creating initramfs image file '/boot/initramfs-5.14.0-648.el9.x86_64kdump.img' done *** Dec 12 13:02:42 np0005557561.novalocal kdumpctl[1018]: kdump: kexec: loaded kdump kernel Dec 12 13:02:42 np0005557561.novalocal kdumpctl[1018]: kdump: Starting kdump: [OK] Dec 12 13:02:42 np0005557561.novalocal systemd[1]: Finished Crash recovery kernel arming. Dec 12 13:02:42 np0005557561.novalocal systemd[1]: Startup finished in 2.107s (kernel) + 3.074s (initrd) + 18.940s (userspace) = 24.122s. Dec 12 13:02:43 np0005557561.novalocal python3[4469]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 12 13:02:44 np0005557561.novalocal python3[4509]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 12 13:02:46 np0005557561.novalocal python3[4535]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 12 13:02:46 np0005557561.novalocal python3[4559]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:47 np0005557561.novalocal python3[4658]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:02:47 np0005557561.novalocal python3[4729]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562566.7408745-163-135385936487797/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=26cacad55edf4c21bf4f8dec9a6cfe5a_id_rsa follow=False checksum=418a24e229a8a5b3ad591108836d960b521a5ecd backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:48 np0005557561.novalocal python3[4852]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:02:48 np0005557561.novalocal python3[4923]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562567.6945431-174-137487645019470/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=26cacad55edf4c21bf4f8dec9a6cfe5a_id_rsa.pub follow=False checksum=f54906ed7fd23cc4817b5e7d7f93291841ca1049 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:49 np0005557561.novalocal python3[4971]: ansible-ping Invoked with data=pong Dec 12 13:02:50 np0005557561.novalocal python3[4995]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 12 13:02:51 np0005557561.novalocal python3[5053]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Dec 12 13:02:52 np0005557561.novalocal python3[5085]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:52 np0005557561.novalocal python3[5109]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:53 np0005557561.novalocal python3[5133]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:53 np0005557561.novalocal python3[5157]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:53 np0005557561.novalocal python3[5181]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:53 np0005557561.novalocal python3[5205]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:02:56 np0005557561.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 12 13:02:56 np0005557561.novalocal python3[5231]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 12 13:02:57 np0005557561.novalocal sshd-session[5234]: Accepted publickey for zuul-worker from 38.102.83.114 port 40188 ssh2: RSA SHA256:9xYxGKGqkBasufEThSoNGzjPFny3X6L6WB48tiDj54Y Dec 12 13:02:57 np0005557561.novalocal systemd-logind[795]: New session 3 of user zuul-worker. Dec 12 13:02:57 np0005557561.novalocal systemd[1]: Started Session 3 of User zuul-worker. Dec 12 13:02:57 np0005557561.novalocal sshd-session[5234]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Dec 12 13:03:00 np0005557561.novalocal sshd-session[5237]: Received disconnect from 38.102.83.114 port 40188:11: disconnected by user Dec 12 13:03:00 np0005557561.novalocal sshd-session[5237]: Disconnected from user zuul-worker 38.102.83.114 port 40188 Dec 12 13:03:00 np0005557561.novalocal sshd-session[5234]: pam_unix(sshd:session): session closed for user zuul-worker Dec 12 13:03:00 np0005557561.novalocal systemd[1]: session-3.scope: Deactivated successfully. Dec 12 13:03:00 np0005557561.novalocal systemd[1]: session-3.scope: Consumed 1.985s CPU time. Dec 12 13:03:00 np0005557561.novalocal systemd-logind[795]: Session 3 logged out. Waiting for processes to exit. Dec 12 13:03:00 np0005557561.novalocal systemd-logind[795]: Removed session 3. Dec 12 13:03:00 np0005557561.novalocal python3[5285]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:00 np0005557561.novalocal python3[5309]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:01 np0005557561.novalocal python3[5333]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:01 np0005557561.novalocal python3[5357]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:01 np0005557561.novalocal python3[5381]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:01 np0005557561.novalocal python3[5405]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:02 np0005557561.novalocal python3[5430]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163e3b-3c83-8928-d981-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:02 np0005557561.novalocal sudo[5431]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Dec 12 13:03:02 np0005557561.novalocal sudo[5431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:02 np0005557561.novalocal sudo[5431]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:03 np0005557561.novalocal python3[5459]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:03 np0005557561.novalocal sudo[5535]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hkuytlecrrstrlszidxjkvmxevjlxpcc ; /usr/bin/python3' Dec 12 13:03:03 np0005557561.novalocal sudo[5535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:03 np0005557561.novalocal python3[5537]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:03:03 np0005557561.novalocal sudo[5535]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:03 np0005557561.novalocal sudo[5608]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lmlgjnikffqpbbpqfzslcjxyxtujncpo ; /usr/bin/python3' Dec 12 13:03:03 np0005557561.novalocal sudo[5608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:04 np0005557561.novalocal python3[5610]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562583.3701844-91-217568455787934/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:04 np0005557561.novalocal sudo[5608]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:04 np0005557561.novalocal sudo[5710]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rxqwdfgfbrkpyewlfbepcomatksqqfda ; /usr/bin/python3' Dec 12 13:03:04 np0005557561.novalocal sudo[5710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:04 np0005557561.novalocal python3[5712]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:03:04 np0005557561.novalocal sudo[5710]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:05 np0005557561.novalocal sudo[5785]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-owzscgxlqwceleytuazioxfmrmsbengq ; /usr/bin/python3' Dec 12 13:03:05 np0005557561.novalocal sudo[5785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:05 np0005557561.novalocal python3[5787]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562584.5145855-103-200023334079069/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:05 np0005557561.novalocal sudo[5785]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:05 np0005557561.novalocal sudo[5887]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ypcnjaxasgeaqmahnzhfgqglsyqoaxyr ; /usr/bin/python3' Dec 12 13:03:05 np0005557561.novalocal sudo[5887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:05 np0005557561.novalocal python3[5889]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:03:05 np0005557561.novalocal sudo[5887]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:06 np0005557561.novalocal sudo[5962]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xqahqowvzvsnmvfptmvznphylpdlqxzg ; /usr/bin/python3' Dec 12 13:03:06 np0005557561.novalocal sudo[5962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:06 np0005557561.novalocal python3[5964]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562585.5173216-103-107117133045978/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:06 np0005557561.novalocal sudo[5962]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:06 np0005557561.novalocal sudo[6012]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-louizoenryxoumocthmmennnjjwsnfio ; /usr/bin/python3' Dec 12 13:03:06 np0005557561.novalocal sudo[6012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:06 np0005557561.novalocal python3[6014]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:06 np0005557561.novalocal python3[6014]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Dec 12 13:03:06 np0005557561.novalocal sudo[6012]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:07 np0005557561.novalocal sudo[6038]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-djpdczddtfentwfhrqbgmzfeckumcnvo ; /usr/bin/python3' Dec 12 13:03:07 np0005557561.novalocal sudo[6038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:07 np0005557561.novalocal python3[6040]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:07 np0005557561.novalocal sudo[6038]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:07 np0005557561.novalocal sudo[6066]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hihlolsdjkoamjrcovccbolsebpruvjo ; /usr/bin/python3' Dec 12 13:03:07 np0005557561.novalocal sudo[6066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:07 np0005557561.novalocal python3[6068]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:18 np0005557561.novalocal sudo[6066]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:19 np0005557561.novalocal python3[6110]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:20 np0005557561.novalocal python3[6135]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 12 13:03:20 np0005557561.novalocal sudo[6163]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mloanokbmuohepvnwtjobdidjswrmhel ; /usr/bin/python3' Dec 12 13:03:20 np0005557561.novalocal sudo[6163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:20 np0005557561.novalocal python3[6165]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:03:21 np0005557561.novalocal sudo[6163]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:22 np0005557561.novalocal python3[6197]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 12 13:03:23 np0005557561.novalocal python3[6225]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 12 13:03:24 np0005557561.novalocal python3[6253]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163e3b-3c83-114c-4635-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:27 np0005557561.novalocal python3[6285]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163e3b-3c83-114c-4635-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:30 np0005557561.novalocal python3[6315]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163e3b-3c83-114c-4635-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:30 np0005557561.novalocal sudo[6342]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-icsqfbdvhjxdemdfksyxrxzjtvdpmrhy ; /usr/bin/python3' Dec 12 13:03:30 np0005557561.novalocal sudo[6342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:30 np0005557561.novalocal python3[6344]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:30 np0005557561.novalocal sudo[6342]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:31 np0005557561.novalocal python3[6369]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:31 np0005557561.novalocal sudo[6402]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-myjvuctyegrjojrqasmmbvlcqsmsjrzi ; /usr/bin/python3' Dec 12 13:03:31 np0005557561.novalocal sudo[6402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:31 np0005557561.novalocal python3[6404]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:31 np0005557561.novalocal sudo[6402]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:32 np0005557561.novalocal sudo[6480]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iutlecxdrsripnasxeftohtiryankwug ; /usr/bin/python3' Dec 12 13:03:32 np0005557561.novalocal sudo[6480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:32 np0005557561.novalocal python3[6482]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 12 13:03:32 np0005557561.novalocal sudo[6480]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:32 np0005557561.novalocal sudo[6553]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xnjcyspvgwejoyfwhrnrvhztgyighzon ; /usr/bin/python3' Dec 12 13:03:32 np0005557561.novalocal sudo[6553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:32 np0005557561.novalocal python3[6555]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1765562611.9635901-81-79803955267574/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 12 13:03:32 np0005557561.novalocal sudo[6553]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:33 np0005557561.novalocal sudo[6604]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-poyitvkgrizjnivcfrbiagrfvgnpbudc ; /usr/bin/python3' Dec 12 13:03:33 np0005557561.novalocal sudo[6604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:03:33 np0005557561.novalocal python3[6606]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:03:33 np0005557561.novalocal sudo[6604]: pam_unix(sudo:session): session closed for user root Dec 12 13:03:34 np0005557561.novalocal python3[6633]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Dec 12 13:03:35 np0005557561.novalocal irqbalance[781]: Cannot change IRQ 27 affinity: Operation not permitted Dec 12 13:03:35 np0005557561.novalocal irqbalance[781]: IRQ 27 affinity is now unmanaged Dec 12 13:03:40 np0005557561.novalocal python3[6666]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="epoxy" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-epoxy-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163e3b-3c83-114c-4635-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:04:42 np0005557561.novalocal chronyd[791]: Selected source 149.56.19.163 (2.centos.pool.ntp.org) Dec 12 13:04:46 np0005557561.novalocal sudo[6946]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ttfimbgqybusxihcwgaflcxppcrnwaqa ; /usr/bin/python3' Dec 12 13:04:46 np0005557561.novalocal sudo[6946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:46 np0005557561.novalocal python3[6948]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Dec 12 13:04:46 np0005557561.novalocal sudo[6946]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:46 np0005557561.novalocal sudo[6986]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vqbzdswsszikgppobigbmwhjjwmfwnjg ; /usr/bin/python3' Dec 12 13:04:46 np0005557561.novalocal sudo[6986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:46 np0005557561.novalocal python3[6988]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:04:46 np0005557561.novalocal python3[6988]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Dec 12 13:04:46 np0005557561.novalocal sudo[6989]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Dec 12 13:04:46 np0005557561.novalocal sudo[6989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:04:47 np0005557561.novalocal sudo[6989]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:47 np0005557561.novalocal sudo[6986]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:47 np0005557561.novalocal sudo[6999]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pbpqfwhfmuppthpgebtpdlfeprjktqzj ; /usr/bin/python3' Dec 12 13:04:47 np0005557561.novalocal sudo[6999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:47 np0005557561.novalocal python3[7001]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Dec 12 13:04:47 np0005557561.novalocal sudo[6999]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:48 np0005557561.novalocal sudo[7010]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-msfsugyetywnmwzqmcusknnovobanjcx ; /usr/bin/python3' Dec 12 13:04:48 np0005557561.novalocal sudo[7010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:48 np0005557561.novalocal python3[7012]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:04:48 np0005557561.novalocal sudo[7010]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:49 np0005557561.novalocal sudo[7028]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lfzhaurqujmvkzhjekmdxxvpgvjwqmkk ; /usr/bin/python3' Dec 12 13:04:49 np0005557561.novalocal sudo[7028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:49 np0005557561.novalocal python3[7030]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:04:51 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:04:52 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:04:52 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:04:52 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:04:53 np0005557561.novalocal systemd-rc-local-generator[7103]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:04:53 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:04:56 np0005557561.novalocal sudo[7028]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:56 np0005557561.novalocal sudo[8554]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nzmacrxcigzgebglfpnxmfxslbvytgjw ; /usr/bin/python3' Dec 12 13:04:56 np0005557561.novalocal sudo[8554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:56 np0005557561.novalocal python3[8580]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Dec 12 13:04:56 np0005557561.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Dec 12 13:04:56 np0005557561.novalocal systemd[1]: Starting Authorization Manager... Dec 12 13:04:56 np0005557561.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Dec 12 13:04:56 np0005557561.novalocal polkitd[9478]: Started polkitd version 0.117 Dec 12 13:04:56 np0005557561.novalocal sudo[8554]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:57 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:04:57 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:04:57 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 2 rules Dec 12 13:04:57 np0005557561.novalocal systemd[1]: Started Authorization Manager. Dec 12 13:04:57 np0005557561.novalocal polkitd[9478]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 12 13:04:57 np0005557561.novalocal sudo[9606]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qxtkpuzgacaanbnnktrggdzvreujtnhz ; /usr/bin/python3' Dec 12 13:04:57 np0005557561.novalocal sudo[9606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:57 np0005557561.novalocal python3[9633]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:04:57 np0005557561.novalocal sudo[9606]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:57 np0005557561.novalocal sudo[10072]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cwkgprlpfvgyfekrdebkijoyzvdokccx ; /usr/bin/python3' Dec 12 13:04:57 np0005557561.novalocal sudo[10072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:57 np0005557561.novalocal python3[10090]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:04:58 np0005557561.novalocal sudo[10072]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:59 np0005557561.novalocal sudo[11165]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jrtglirktyawismycrbthqwduuzkvjuo ; /usr/bin/python3' Dec 12 13:04:59 np0005557561.novalocal sudo[11165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:59 np0005557561.novalocal python3[11176]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:04:59 np0005557561.novalocal sudo[11165]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:59 np0005557561.novalocal sudo[11363]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wzehrfuodwygcppeijrshjgshlnzwelm ; /usr/bin/python3' Dec 12 13:04:59 np0005557561.novalocal sudo[11363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:04:59 np0005557561.novalocal python3[11374]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:04:59 np0005557561.novalocal sudo[11363]: pam_unix(sudo:session): session closed for user root Dec 12 13:04:59 np0005557561.novalocal sudo[11754]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cbzipjfzpfidkjxridwhkqbtgscrxkyu ; /usr/bin/python3' Dec 12 13:04:59 np0005557561.novalocal sudo[11754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:00 np0005557561.novalocal python3[11775]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-epoxy/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:05:00 np0005557561.novalocal sudo[11754]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:00 np0005557561.novalocal sudo[12011]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-huyoctfnxpqgbzsgbhretglaynjvernn ; /usr/bin/python3' Dec 12 13:05:00 np0005557561.novalocal sudo[12011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:00 np0005557561.novalocal python3[12032]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:05:00 np0005557561.novalocal sudo[12011]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:00 np0005557561.novalocal sudo[12229]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cltqnkhtmeyomlktovjwsrimsokhrwpn ; /usr/bin/python3' Dec 12 13:05:00 np0005557561.novalocal sudo[12229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:00 np0005557561.novalocal python3[12240]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:05:00 np0005557561.novalocal sudo[12229]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:01 np0005557561.novalocal sudo[12635]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lenfubporpaaatbqiquzkcijbvpvlmlb ; /usr/bin/python3' Dec 12 13:05:01 np0005557561.novalocal sudo[12635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:01 np0005557561.novalocal python3[12650]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:05:04 np0005557561.novalocal sudo[12635]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:04 np0005557561.novalocal sudo[13732]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bhbttdapqpdkkweniwadowaqaweprdqv ; /usr/bin/python3' Dec 12 13:05:04 np0005557561.novalocal sudo[13732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:04 np0005557561.novalocal python3[13739]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 12 13:05:04 np0005557561.novalocal python3[13739]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Dec 12 13:05:04 np0005557561.novalocal sudo[13732]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:05 np0005557561.novalocal sudo[13986]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uqpdadzgvjbyzgbzqdkftoqfglachrwk ; /usr/bin/python3' Dec 12 13:05:05 np0005557561.novalocal sudo[13986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:05 np0005557561.novalocal python3[13998]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:05:22 np0005557561.novalocal systemd[3067]: Starting Mark boot as successful... Dec 12 13:05:22 np0005557561.novalocal systemd[3067]: Finished Mark boot as successful. Dec 12 13:05:32 np0005557561.novalocal sudo[13986]: pam_unix(sudo:session): session closed for user root Dec 12 13:05:32 np0005557561.novalocal sudo[22790]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kqsmnswoqlxcpaedqdwxxseqkntdmeky ; /usr/bin/python3' Dec 12 13:05:32 np0005557561.novalocal sudo[22790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:05:32 np0005557561.novalocal python3[22801]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:05:48 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:05:48 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:05:49 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:05:49 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:05:49 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 6.570s CPU time. Dec 12 13:05:49 np0005557561.novalocal systemd[1]: run-r44da647a46d645968882683f85d85104.service: Deactivated successfully. Dec 12 13:06:41 np0005557561.novalocal groupadd[44765]: group added to /etc/group: name=rtkit, GID=172 Dec 12 13:06:41 np0005557561.novalocal groupadd[44765]: group added to /etc/gshadow: name=rtkit Dec 12 13:06:41 np0005557561.novalocal groupadd[44765]: new group: name=rtkit, GID=172 Dec 12 13:06:41 np0005557561.novalocal useradd[44773]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Dec 12 13:06:41 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:41 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:41 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:42 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:42 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:44 np0005557561.novalocal sshd-session[44792]: userauth_pubkey: signature algorithm ssh-rsa not in PubkeyAcceptedAlgorithms [preauth] Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: Converting 451 SID table entries... Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:06:51 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:06:54 np0005557561.novalocal sshd-session[44792]: Connection closed by authenticating user root 139.19.117.197 port 42716 [preauth] Dec 12 13:06:59 np0005557561.novalocal groupadd[44846]: group added to /etc/group: name=geoclue, GID=993 Dec 12 13:06:59 np0005557561.novalocal groupadd[44846]: group added to /etc/gshadow: name=geoclue Dec 12 13:06:59 np0005557561.novalocal groupadd[44846]: new group: name=geoclue, GID=993 Dec 12 13:06:59 np0005557561.novalocal useradd[44853]: new user: name=geoclue, UID=993, GID=993, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Dec 12 13:06:59 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:59 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=2 res=1 Dec 12 13:06:59 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 3 rules Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:06:59 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 3 rules Dec 12 13:06:59 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:06:59 np0005557561.novalocal groupadd[44865]: group added to /etc/group: name=flatpak, GID=992 Dec 12 13:06:59 np0005557561.novalocal groupadd[44865]: group added to /etc/gshadow: name=flatpak Dec 12 13:06:59 np0005557561.novalocal groupadd[44865]: new group: name=flatpak, GID=992 Dec 12 13:06:59 np0005557561.novalocal useradd[44872]: new user: name=flatpak, UID=992, GID=992, home=/, shell=/usr/sbin/nologin, from=none Dec 12 13:07:00 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:07:00 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:07:00 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 4 rules Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:07:00 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 4 rules Dec 12 13:07:01 np0005557561.novalocal sshd[1007]: Received signal 15; terminating. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Stopping OpenSSH server daemon... Dec 12 13:07:01 np0005557561.novalocal systemd[1]: sshd.service: Deactivated successfully. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Stopped OpenSSH server daemon. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Stopped target sshd-keygen.target. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Stopping sshd-keygen.target... Dec 12 13:07:01 np0005557561.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:07:01 np0005557561.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:07:01 np0005557561.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Reached target sshd-keygen.target. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Starting OpenSSH server daemon... Dec 12 13:07:01 np0005557561.novalocal sshd[44913]: Server listening on 0.0.0.0 port 22. Dec 12 13:07:01 np0005557561.novalocal sshd[44913]: Server listening on :: port 22. Dec 12 13:07:01 np0005557561.novalocal systemd[1]: Started OpenSSH server daemon. Dec 12 13:07:02 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:07:02 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:07:03 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:07:03 np0005557561.novalocal systemd-rc-local-generator[45006]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:07:03 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:07:06 np0005557561.novalocal sudo[22790]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:06 np0005557561.novalocal sudo[48557]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rbuddhxqlkucvjifrftazbtkpbkuwniw ; /usr/bin/python3' Dec 12 13:07:06 np0005557561.novalocal sudo[48557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:07 np0005557561.novalocal python3[48585]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:07:12 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:07:12 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:07:12 np0005557561.novalocal systemd-rc-local-generator[52959]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:07:12 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:07:13 np0005557561.novalocal sudo[48557]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:13 np0005557561.novalocal sudo[53595]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aweylxjpnrnmacogyjeyvfrwgeecozqi ; /usr/bin/python3' Dec 12 13:07:13 np0005557561.novalocal sudo[53595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:14 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 13.826s CPU time. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: run-r81d9cb7a89bc4eb685357f6da07fc6c2.service: Deactivated successfully. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: run-rb3a4d175e9594c3381b75e7d2ebf9cd4.service: Deactivated successfully. Dec 12 13:07:14 np0005557561.novalocal python3[53600]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Dec 12 13:07:14 np0005557561.novalocal sudo[53595]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:14 np0005557561.novalocal sudo[53621]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mchxlpefsxoblnrowtwuqtwxjpgaldgb ; /usr/bin/python3' Dec 12 13:07:14 np0005557561.novalocal sudo[53621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:14 np0005557561.novalocal python3[53623]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:07:14 np0005557561.novalocal systemd-rc-local-generator[53641]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Starting Resets System Activity Logs... Dec 12 13:07:14 np0005557561.novalocal systemd[1]: Finished Resets System Activity Logs. Dec 12 13:07:15 np0005557561.novalocal sudo[53621]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:15 np0005557561.novalocal sudo[53670]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rvpghvzoirsejpeshjfyxkxtbhmvafuh ; /usr/bin/python3' Dec 12 13:07:15 np0005557561.novalocal sudo[53670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:15 np0005557561.novalocal python3[53672]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005557561 np0005557561.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Dec 12 13:07:15 np0005557561.novalocal sudo[53670]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:15 np0005557561.novalocal sudo[53679]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rdqvtcnyysofkkqkqpjyiiwwmqbpinqs ; /usr/bin/python3' Dec 12 13:07:15 np0005557561.novalocal sudo[53679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:16 np0005557561.novalocal python3[53681]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 12 13:07:17 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:07:17 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:07:17 np0005557561.novalocal sudo[53679]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:18 np0005557561.novalocal sudo[54019]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-geppibfgzsfwejquusqzdfjvhrifkogk ; /usr/bin/python3' Dec 12 13:07:18 np0005557561.novalocal sudo[54019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:18 np0005557561.novalocal python3[54037]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Dec 12 13:07:18 np0005557561.novalocal python3[54037]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Dec 12 13:07:18 np0005557561.novalocal sudo[54019]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:18 np0005557561.novalocal sudo[54047]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zgjoehyuhsdsrwximjagaogidufcmkbi ; /usr/bin/python3' Dec 12 13:07:18 np0005557561.novalocal sudo[54047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:18 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:07:18 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:07:18 np0005557561.novalocal systemd[1]: run-rfdddc4c92ded4da8a469cb7233348140.service: Deactivated successfully. Dec 12 13:07:18 np0005557561.novalocal python3[54049]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Dec 12 13:07:18 np0005557561.novalocal python3[54049]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Dec 12 13:07:18 np0005557561.novalocal sudo[54047]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:18 np0005557561.novalocal sudo[54059]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yjxfkdictsrnpyagyxkinbmiqmmevcni ; /usr/bin/python3' Dec 12 13:07:18 np0005557561.novalocal sudo[54059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:19 np0005557561.novalocal python3[54061]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Dec 12 13:07:20 np0005557561.novalocal sudo[54059]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:20 np0005557561.novalocal sudo[54092]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cchobaxirqdcnsjxjfeilskqqccutokf ; /usr/bin/python3' Dec 12 13:07:20 np0005557561.novalocal sudo[54092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:20 np0005557561.novalocal python3[54094]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:07:20 np0005557561.novalocal sudo[54092]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:20 np0005557561.novalocal sudo[54117]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wyxlchcggccowvqqcqyftmpdaexekgzs ; /usr/bin/python3' Dec 12 13:07:20 np0005557561.novalocal sudo[54117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:20 np0005557561.novalocal python3[54119]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Dec 12 13:07:20 np0005557561.novalocal sudo[54117]: pam_unix(sudo:session): session closed for user root Dec 12 13:07:20 np0005557561.novalocal sudo[54126]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jvldazbkzvafpnigxdeoeingxluoiywj ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Dec 12 13:07:20 np0005557561.novalocal sudo[54126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:07:21 np0005557561.novalocal python3[54128]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Dec 12 13:08:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:08:04 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:08:04 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:08:22 np0005557561.novalocal systemd[3067]: Created slice User Background Tasks Slice. Dec 12 13:08:22 np0005557561.novalocal systemd[3067]: Starting Cleanup of User's Temporary Files and Directories... Dec 12 13:08:22 np0005557561.novalocal systemd[3067]: Finished Cleanup of User's Temporary Files and Directories. Dec 12 13:08:29 np0005557561.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:44 across:10355464k Dec 12 13:08:37 np0005557561.novalocal groupadd[54197]: group added to /etc/group: name=puppet, GID=52 Dec 12 13:08:37 np0005557561.novalocal groupadd[54197]: group added to /etc/gshadow: name=puppet Dec 12 13:08:37 np0005557561.novalocal groupadd[54197]: new group: name=puppet, GID=52 Dec 12 13:08:37 np0005557561.novalocal useradd[54204]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Dec 12 13:08:38 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:08:38 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:08:38 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:08:38 np0005557561.novalocal systemd-rc-local-generator[54240]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:08:39 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:08:40 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:08:40 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:08:40 np0005557561.novalocal systemd[1]: run-rd7996bbdeb4443adad14246451738a0e.service: Deactivated successfully. Dec 12 13:09:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:09:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:09:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: Converting 483 SID table entries... Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:09:06 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:09:07 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 12 13:09:07 np0005557561.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Dec 12 13:09:07 np0005557561.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Dec 12 13:09:08 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:09:08 np0005557561.novalocal systemd-rc-local-generator[55047]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:09:15 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:09:15 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:09:18 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:09:18 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:09:18 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:09:18 np0005557561.novalocal systemd-rc-local-generator[55292]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:09:18 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:09:24 np0005557561.novalocal dbus-broker-launch[772]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Dec 12 13:09:24 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:09:24 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:09:24 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.895s CPU time. Dec 12 13:09:24 np0005557561.novalocal systemd[1]: run-r1c29a0b9f4624f1a9063c43153723166.service: Deactivated successfully. Dec 12 13:10:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:10:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:10:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:10:27 np0005557561.novalocal setsebool[61387]: The virt_use_nfs policy boolean was changed to 1 by root Dec 12 13:10:27 np0005557561.novalocal setsebool[61387]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: Converting 520 SID table entries... Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:10:37 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:11:03 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=5 res=1 Dec 12 13:11:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:11:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:11:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: Converting 2735 SID table entries... Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:11:41 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:12:03 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=7 res=1 Dec 12 13:12:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:12:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:12:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:12:16 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:12:16 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:12:16 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:12:16 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:12:16 np0005557561.novalocal systemd[1]: run-r79976619d9e64d619de41207a6939a83.service: Deactivated successfully. Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: Converting 2735 SID table entries... Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:12:28 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:12:28 np0005557561.novalocal groupadd[62449]: group added to /etc/group: name=memcached, GID=989 Dec 12 13:12:28 np0005557561.novalocal groupadd[62449]: group added to /etc/gshadow: name=memcached Dec 12 13:12:28 np0005557561.novalocal groupadd[62449]: new group: name=memcached, GID=989 Dec 12 13:12:28 np0005557561.novalocal useradd[62456]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Dec 12 13:12:30 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=8 res=1 Dec 12 13:12:30 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:12:30 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:12:30 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:30 np0005557561.novalocal systemd-rc-local-generator[62890]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:30 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:12:31 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: run-rad5ea513cde64f8b8ad88f4e18b57dd0.service: Deactivated successfully. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:31 np0005557561.novalocal systemd-rc-local-generator[63060]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: Started memcached daemon. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:31 np0005557561.novalocal systemd-rc-local-generator[63104]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:31 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:31 np0005557561.novalocal systemd-rc-local-generator[63134]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:40 np0005557561.novalocal groupadd[63233]: group added to /etc/group: name=epmd, GID=988 Dec 12 13:12:40 np0005557561.novalocal groupadd[63233]: group added to /etc/gshadow: name=epmd Dec 12 13:12:40 np0005557561.novalocal groupadd[63233]: new group: name=epmd, GID=988 Dec 12 13:12:40 np0005557561.novalocal useradd[63240]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Dec 12 13:12:41 np0005557561.novalocal groupadd[63249]: group added to /etc/group: name=rabbitmq, GID=987 Dec 12 13:12:41 np0005557561.novalocal groupadd[63249]: group added to /etc/gshadow: name=rabbitmq Dec 12 13:12:41 np0005557561.novalocal groupadd[63249]: new group: name=rabbitmq, GID=987 Dec 12 13:12:41 np0005557561.novalocal useradd[63256]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Dec 12 13:12:42 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:42 np0005557561.novalocal systemd-rc-local-generator[63283]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:43 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:12:43 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:12:43 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:12:43 np0005557561.novalocal systemd-rc-local-generator[63324]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:12:43 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:12:44 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:12:44 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:12:44 np0005557561.novalocal systemd[1]: run-r7ca4dc16aaa44c308214c21f2da60c91.service: Deactivated successfully. Dec 12 13:12:47 np0005557561.novalocal runuser[64285]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:12:48 np0005557561.novalocal runuser[64285]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:13:02 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:13:02 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:13:02 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: Converting 2741 SID table entries... Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:13:04 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:13:04 np0005557561.novalocal groupadd[64797]: group added to /etc/group: name=mysql, GID=27 Dec 12 13:13:04 np0005557561.novalocal groupadd[64797]: group added to /etc/gshadow: name=mysql Dec 12 13:13:04 np0005557561.novalocal groupadd[64797]: new group: name=mysql, GID=27 Dec 12 13:13:04 np0005557561.novalocal useradd[64803]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Dec 12 13:13:06 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=9 res=1 Dec 12 13:13:06 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:06 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:06 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:06 np0005557561.novalocal systemd-rc-local-generator[65280]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:07 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:13:10 np0005557561.novalocal groupadd[67688]: group added to /etc/group: name=redis, GID=986 Dec 12 13:13:10 np0005557561.novalocal groupadd[67688]: group added to /etc/gshadow: name=redis Dec 12 13:13:10 np0005557561.novalocal groupadd[67688]: new group: name=redis, GID=986 Dec 12 13:13:10 np0005557561.novalocal useradd[67732]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Dec 12 13:13:11 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:11 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:11 np0005557561.novalocal systemd-rc-local-generator[68131]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:11 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:13:12 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:12 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:12 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.225s CPU time. Dec 12 13:13:12 np0005557561.novalocal systemd[1]: run-rb557ad3258fe4ff3b421573487075b68.service: Deactivated successfully. Dec 12 13:13:12 np0005557561.novalocal systemd[1]: run-r48a5bc8da2b644daa4390beafb61828a.service: Deactivated successfully. Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: Converting 2744 SID table entries... Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:13:23 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:13:23 np0005557561.novalocal groupadd[68622]: group added to /etc/group: name=unbound, GID=985 Dec 12 13:13:23 np0005557561.novalocal groupadd[68622]: group added to /etc/gshadow: name=unbound Dec 12 13:13:23 np0005557561.novalocal groupadd[68622]: new group: name=unbound, GID=985 Dec 12 13:13:23 np0005557561.novalocal useradd[68629]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Dec 12 13:13:23 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=10 res=1 Dec 12 13:13:23 np0005557561.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Dec 12 13:13:23 np0005557561.novalocal groupadd[68642]: group added to /etc/group: name=openvswitch, GID=984 Dec 12 13:13:23 np0005557561.novalocal groupadd[68642]: group added to /etc/gshadow: name=openvswitch Dec 12 13:13:23 np0005557561.novalocal groupadd[68642]: new group: name=openvswitch, GID=984 Dec 12 13:13:23 np0005557561.novalocal useradd[68649]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Dec 12 13:13:23 np0005557561.novalocal groupadd[68657]: group added to /etc/group: name=hugetlbfs, GID=983 Dec 12 13:13:23 np0005557561.novalocal groupadd[68657]: group added to /etc/gshadow: name=hugetlbfs Dec 12 13:13:23 np0005557561.novalocal groupadd[68657]: new group: name=hugetlbfs, GID=983 Dec 12 13:13:23 np0005557561.novalocal usermod[68665]: add 'openvswitch' to group 'hugetlbfs' Dec 12 13:13:23 np0005557561.novalocal usermod[68665]: add 'openvswitch' to shadow group 'hugetlbfs' Dec 12 13:13:25 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:25 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:25 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:25 np0005557561.novalocal systemd-rc-local-generator[69140]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:25 np0005557561.novalocal systemd-sysv-generator[69143]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:25 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:13:26 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:26 np0005557561.novalocal systemd-rc-local-generator[69718]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:26 np0005557561.novalocal systemd-sysv-generator[69723]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:26 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:26 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:26 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.396s CPU time. Dec 12 13:13:27 np0005557561.novalocal systemd[1]: run-r2782c16f8844409f9fc0d84b08b30de5.service: Deactivated successfully. Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Starting Open vSwitch Database Unit... Dec 12 13:13:27 np0005557561.novalocal chown[69732]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69737]: /etc/openvswitch/conf.db does not exist ... (warning). Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69737]: Creating empty database /etc/openvswitch/conf.db [ OK ] Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69737]: Starting ovsdb-server [ OK ] Dec 12 13:13:27 np0005557561.novalocal ovs-vsctl[69786]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Dec 12 13:13:27 np0005557561.novalocal ovs-vsctl[69806]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-99.el9s "external-ids:system-id=\"309558af-301c-4aab-838e-ad6d01bb5250\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69737]: Configuring Open vSwitch system IDs [ OK ] Dec 12 13:13:27 np0005557561.novalocal ovs-vsctl[69811]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005557561 Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69737]: Enabling remote OVSDB managers [ OK ] Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Started Open vSwitch Database Unit. Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Dec 12 13:13:27 np0005557561.novalocal kernel: openvswitch: Open vSwitch switching datapath Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69856]: Inserting openvswitch module [ OK ] Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69825]: Starting ovs-vswitchd [ OK ] Dec 12 13:13:27 np0005557561.novalocal ovs-ctl[69825]: Enabling remote OVSDB managers [ OK ] Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Dec 12 13:13:27 np0005557561.novalocal ovs-vsctl[69873]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005557561 Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Starting Open vSwitch... Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Finished Open vSwitch. Dec 12 13:13:27 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:28 np0005557561.novalocal systemd-sysv-generator[69901]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:28 np0005557561.novalocal systemd-rc-local-generator[69896]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:28 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:28 np0005557561.novalocal systemd-sysv-generator[69930]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:28 np0005557561.novalocal systemd-rc-local-generator[69927]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:28 np0005557561.novalocal ovs-vsctl[69941]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Dec 12 13:13:28 np0005557561.novalocal kernel: ovs-system: entered promiscuous mode Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.6346] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.6377] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Dec 12 13:13:28 np0005557561.novalocal kernel: Timeout policy base is empty Dec 12 13:13:28 np0005557561.novalocal kernel: br-ex: entered promiscuous mode Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.6650] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.6664] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Dec 12 13:13:28 np0005557561.novalocal systemd-udevd[69956]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:13:28 np0005557561.novalocal systemd-udevd[69958]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.6897] device (br-ex): carrier: link connected Dec 12 13:13:28 np0005557561.novalocal systemd-udevd[69957]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.7288] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.9505] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69977 uid=0 result="success" Dec 12 13:13:28 np0005557561.novalocal ifdown[69978]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:28 np0005557561.novalocal ifdown[69979]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:28 np0005557561.novalocal ifdown[69980]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:28 np0005557561.novalocal NetworkManager[858]: [1765563208.9941] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69986 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.0329] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=69994 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.0684] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70003 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.1565] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70026 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ovs-vsctl[70031]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Dec 12 13:13:29 np0005557561.novalocal kernel: br-ex: left promiscuous mode Dec 12 13:13:29 np0005557561.novalocal kernel: ovs-system: left promiscuous mode Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.2754] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70049 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ifdown[70053]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:29 np0005557561.novalocal ifdown[70054]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:29 np0005557561.novalocal ifdown[70055]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.3304] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70061 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.3869] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70072 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.4335] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70084 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.5236] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70110 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ovs-vsctl[70118]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.5910] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70125 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ifup[70129]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:29 np0005557561.novalocal ifup[70130]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:29 np0005557561.novalocal ifup[70131]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.6333] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70137 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7060] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70149 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ifup[70150]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:29 np0005557561.novalocal ifup[70151]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:29 np0005557561.novalocal ifup[70152]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7475] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70158 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ovs-vsctl[70160]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7715] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Dec 12 13:13:29 np0005557561.novalocal kernel: ovs-system: entered promiscuous mode Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7731] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Dec 12 13:13:29 np0005557561.novalocal kernel: No such timeout policy "ovs_test_tp" Dec 12 13:13:29 np0005557561.novalocal kernel: br-ex: entered promiscuous mode Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7818] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.7831] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.8057] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70181 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.8438] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70192 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.9064] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=70210 uid=0 result="success" Dec 12 13:13:29 np0005557561.novalocal ovs-vsctl[70230]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Dec 12 13:13:29 np0005557561.novalocal kernel: loop1: entered promiscuous mode Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.9792] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:13:29 np0005557561.novalocal NetworkManager[858]: [1765563209.9810] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:13:30 np0005557561.novalocal NetworkManager[858]: [1765563210.0174] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70237 uid=0 result="success" Dec 12 13:13:30 np0005557561.novalocal ifup[70238]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:30 np0005557561.novalocal ifup[70239]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:30 np0005557561.novalocal ifup[70240]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:30 np0005557561.novalocal NetworkManager[858]: [1765563210.0720] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70246 uid=0 result="success" Dec 12 13:13:30 np0005557561.novalocal ovs-vsctl[70250]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 12 13:13:30 np0005557561.novalocal NetworkManager[858]: [1765563210.1623] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70257 uid=0 result="success" Dec 12 13:13:30 np0005557561.novalocal ifup[70258]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 12 13:13:30 np0005557561.novalocal ifup[70259]: 'network-scripts' will be removed from distribution in near future. Dec 12 13:13:30 np0005557561.novalocal ifup[70260]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 12 13:13:30 np0005557561.novalocal NetworkManager[858]: [1765563210.2046] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=70266 uid=0 result="success" Dec 12 13:13:30 np0005557561.novalocal ovs-vsctl[70270]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Dec 12 13:13:30 np0005557561.novalocal NetworkManager[858]: [1765563210.2819] device (br-ex): carrier: link connected Dec 12 13:13:32 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:32 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:32 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:32 np0005557561.novalocal systemd-rc-local-generator[70344]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:32 np0005557561.novalocal systemd-sysv-generator[70348]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:33 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:13:33 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:33 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:33 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.031s CPU time. Dec 12 13:13:33 np0005557561.novalocal systemd[1]: run-r92972daec7b243e99e1a04e946838b11.service: Deactivated successfully. Dec 12 13:13:36 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:36 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:13:36 np0005557561.novalocal systemd-rc-local-generator[70766]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:13:36 np0005557561.novalocal systemd-sysv-generator[70769]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:13:36 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:13:36 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:36 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:36 np0005557561.novalocal systemd[1]: run-r9609b64888504a1585af518d6a18dd54.service: Deactivated successfully. Dec 12 13:13:37 np0005557561.novalocal ovs-vsctl[70839]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Dec 12 13:13:37 np0005557561.novalocal ovs-vsctl[70841]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Dec 12 13:13:37 np0005557561.novalocal ovs-vsctl[70844]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70847]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005557561.novalocal Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70849]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70851]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70853]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70855]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70859]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70863]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Dec 12 13:13:38 np0005557561.novalocal ovs-vsctl[70867]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Dec 12 13:13:49 np0005557561.novalocal groupadd[70888]: group added to /etc/group: name=keystone, GID=163 Dec 12 13:13:49 np0005557561.novalocal groupadd[70888]: group added to /etc/gshadow: name=keystone Dec 12 13:13:49 np0005557561.novalocal groupadd[70888]: new group: name=keystone, GID=163 Dec 12 13:13:49 np0005557561.novalocal useradd[70895]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Dec 12 13:13:49 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:49 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:50 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:50 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:50 np0005557561.novalocal systemd[1]: run-re8a6026ac2be4c828d657f20975467c4.service: Deactivated successfully. Dec 12 13:13:56 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:13:56 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:13:57 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:13:57 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:13:57 np0005557561.novalocal systemd[1]: run-r19cef00a1a42486b91c96fd14cc40e61.service: Deactivated successfully. Dec 12 13:14:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:14:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:14:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:14:05 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:05 np0005557561.novalocal systemd-rc-local-generator[71636]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:05 np0005557561.novalocal systemd-sysv-generator[71641]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:05 np0005557561.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Dec 12 13:14:05 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:05 np0005557561.novalocal systemd-rc-local-generator[71670]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:05 np0005557561.novalocal systemd-sysv-generator[71674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:05 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:05 np0005557561.novalocal systemd-rc-local-generator[71700]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:05 np0005557561.novalocal systemd-sysv-generator[71704]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:06 np0005557561.novalocal systemd-logind[795]: Watching system buttons on /dev/input/event0 (Power Button) Dec 12 13:14:06 np0005557561.novalocal systemd-logind[795]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 12 13:14:08 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:08 np0005557561.novalocal systemd-sysv-generator[71800]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:08 np0005557561.novalocal systemd-rc-local-generator[71795]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:08 np0005557561.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Dec 12 13:14:08 np0005557561.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Dec 12 13:14:08 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:08 np0005557561.novalocal systemd-sysv-generator[71833]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:08 np0005557561.novalocal systemd-rc-local-generator[71830]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:08 np0005557561.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Dec 12 13:14:10 np0005557561.novalocal groupadd[71844]: group added to /etc/group: name=cinder, GID=165 Dec 12 13:14:10 np0005557561.novalocal groupadd[71844]: group added to /etc/gshadow: name=cinder Dec 12 13:14:10 np0005557561.novalocal groupadd[71844]: new group: name=cinder, GID=165 Dec 12 13:14:10 np0005557561.novalocal useradd[71851]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Dec 12 13:14:10 np0005557561.novalocal useradd[71851]: add 'cinder' to group 'nobody' Dec 12 13:14:10 np0005557561.novalocal useradd[71851]: add 'cinder' to group 'cinder' Dec 12 13:14:10 np0005557561.novalocal useradd[71851]: add 'cinder' to shadow group 'nobody' Dec 12 13:14:10 np0005557561.novalocal useradd[71851]: add 'cinder' to shadow group 'cinder' Dec 12 13:14:11 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:14:11 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:14:11 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:12 np0005557561.novalocal systemd-rc-local-generator[71898]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:12 np0005557561.novalocal systemd-sysv-generator[71903]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:12 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:14 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:14 np0005557561.novalocal systemd-sysv-generator[74095]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:14 np0005557561.novalocal systemd-rc-local-generator[74092]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:14 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:14:14 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:14:14 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.561s CPU time. Dec 12 13:14:14 np0005557561.novalocal systemd[1]: run-re516d2f334b544198106ad78f02f1541.service: Deactivated successfully. Dec 12 13:14:14 np0005557561.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Dec 12 13:14:14 np0005557561.novalocal systemd[1]: Starting Open-iSCSI... Dec 12 13:14:14 np0005557561.novalocal kernel: Loading iSCSI transport class v2.0-870. Dec 12 13:14:15 np0005557561.novalocal systemd[1]: Started Open-iSCSI. Dec 12 13:14:15 np0005557561.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Dec 12 13:14:15 np0005557561.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Dec 12 13:14:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:15 np0005557561.novalocal systemd-rc-local-generator[74131]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:15 np0005557561.novalocal systemd-sysv-generator[74135]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:15 np0005557561.novalocal systemd-sysv-generator[74166]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:15 np0005557561.novalocal systemd-rc-local-generator[74162]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:17 np0005557561.novalocal groupadd[74182]: group added to /etc/group: name=glance, GID=161 Dec 12 13:14:17 np0005557561.novalocal groupadd[74182]: group added to /etc/gshadow: name=glance Dec 12 13:14:17 np0005557561.novalocal groupadd[74182]: new group: name=glance, GID=161 Dec 12 13:14:17 np0005557561.novalocal useradd[74189]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Dec 12 13:14:18 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:18 np0005557561.novalocal systemd-rc-local-generator[74222]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:18 np0005557561.novalocal systemd-sysv-generator[74227]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:18 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:25 np0005557561.novalocal groupadd[74261]: group added to /etc/group: name=radvd, GID=75 Dec 12 13:14:25 np0005557561.novalocal groupadd[74261]: group added to /etc/gshadow: name=radvd Dec 12 13:14:25 np0005557561.novalocal groupadd[74261]: new group: name=radvd, GID=75 Dec 12 13:14:25 np0005557561.novalocal useradd[74270]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Dec 12 13:14:26 np0005557561.novalocal groupadd[74285]: group added to /etc/group: name=haproxy, GID=982 Dec 12 13:14:26 np0005557561.novalocal groupadd[74285]: group added to /etc/gshadow: name=haproxy Dec 12 13:14:26 np0005557561.novalocal groupadd[74285]: new group: name=haproxy, GID=982 Dec 12 13:14:26 np0005557561.novalocal useradd[74292]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Dec 12 13:14:26 np0005557561.novalocal groupadd[74304]: group added to /etc/group: name=dnsmasq, GID=981 Dec 12 13:14:26 np0005557561.novalocal groupadd[74304]: group added to /etc/gshadow: name=dnsmasq Dec 12 13:14:26 np0005557561.novalocal groupadd[74304]: new group: name=dnsmasq, GID=981 Dec 12 13:14:26 np0005557561.novalocal useradd[74311]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Dec 12 13:14:26 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:14:26 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:14:29 np0005557561.novalocal groupadd[74323]: group added to /etc/group: name=neutron, GID=980 Dec 12 13:14:29 np0005557561.novalocal groupadd[74323]: group added to /etc/gshadow: name=neutron Dec 12 13:14:29 np0005557561.novalocal groupadd[74323]: new group: name=neutron, GID=980 Dec 12 13:14:29 np0005557561.novalocal useradd[74330]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Dec 12 13:14:30 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:14:30 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:14:30 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:30 np0005557561.novalocal systemd-sysv-generator[74386]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:30 np0005557561.novalocal systemd-rc-local-generator[74382]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:30 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:31 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:14:31 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:14:31 np0005557561.novalocal systemd[1]: run-r584219c6367c4f489849c9fa330d3904.service: Deactivated successfully. Dec 12 13:14:33 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:33 np0005557561.novalocal systemd-rc-local-generator[75046]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:33 np0005557561.novalocal systemd-sysv-generator[75049]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:33 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:35 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:35 np0005557561.novalocal systemd-sysv-generator[75092]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:35 np0005557561.novalocal systemd-rc-local-generator[75088]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:36 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:40 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:40 np0005557561.novalocal systemd-rc-local-generator[75130]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:40 np0005557561.novalocal systemd-sysv-generator[75135]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:40 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:41 np0005557561.novalocal ovs-vsctl[75146]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Dec 12 13:14:43 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:14:43 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:14:43 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:44 np0005557561.novalocal systemd-rc-local-generator[75190]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:44 np0005557561.novalocal systemd-sysv-generator[75193]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:44 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:44 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:14:44 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:14:44 np0005557561.novalocal systemd[1]: run-r9e280c59228d4c678e771bf50766c066.service: Deactivated successfully. Dec 12 13:14:46 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:47 np0005557561.novalocal systemd-sysv-generator[75617]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:47 np0005557561.novalocal systemd-rc-local-generator[75611]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:47 np0005557561.novalocal systemd[1]: Starting dnf makecache... Dec 12 13:14:47 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: Updating Subscription Management repositories. Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: Unable to read consumer identity Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: This system is not registered with an entitlement server. You can use subscription-manager to register. Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: Failed determining last makecache time. Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-barbican-3416cdce80f63f3e499 160 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-ironic-python-agent-1492c705 182 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-cinder-0c0c5bf5ce1a2104eef20 179 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-python-openstackclient-bc1930c20ede201 179 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-python-cloudkitty-tests-tempest-2c80f8 178 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-os-net-config-f394f149d64d9125b715b046 215 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-nova-3b97b00f0e2b1d7d10b7169 184 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-designate-bbb241f89620faa6d9 230 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-glance-d70e40e4cc993dacb8833 216 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-keystone-6cef9855bfe7d34d6bf 203 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-manila-3ea115c1c31a84c758444 232 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 231 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-octavia-dbec3511b2c49dbf4169 171 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-watcher-024815af711553739b46 194 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 198 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-puppet-openstacklib-12557ed183275edadd 200 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-openstack-swift-06b34fdfa0f09f2bdb655e 191 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-python-tempestconf-8515371b7cceebd4282 191 kB/s | 3.0 kB 00:00 Dec 12 13:14:47 np0005557561.novalocal dnf[75624]: delorean-python-django-horizon-30af7039087e10d7 195 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: CentOS-9 - RabbitMQ 38 67 kB/s | 9.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: CentOS Stream 9 - BaseOS 928 kB/s | 3.9 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: CentOS Stream 9 - AppStream 1.2 MB/s | 4.4 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: CentOS Stream 9 - CRB 1.3 MB/s | 4.3 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: CentOS Stream 9 - Extras packages 724 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: dlrn-epoxy-testing 179 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: dlrn-epoxy-build-deps 200 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: centos9-rabbitmq 391 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: centos9-storage 993 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: centos9-opstools 1.0 MB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: NFV SIG OpenvSwitch 697 kB/s | 3.0 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: Extra Packages for Enterprise Linux 9 - x86_64 256 kB/s | 34 kB 00:00 Dec 12 13:14:48 np0005557561.novalocal dnf[75624]: Metadata cache created. Dec 12 13:14:48 np0005557561.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 12 13:14:48 np0005557561.novalocal systemd[1]: Finished dnf makecache. Dec 12 13:14:48 np0005557561.novalocal systemd[1]: dnf-makecache.service: Consumed 1.157s CPU time. Dec 12 13:14:50 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:14:50 np0005557561.novalocal systemd-rc-local-generator[75687]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:14:50 np0005557561.novalocal systemd-sysv-generator[75691]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:14:50 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:14:58 np0005557561.novalocal groupadd[75714]: group added to /etc/group: name=placement, GID=979 Dec 12 13:14:58 np0005557561.novalocal groupadd[75714]: group added to /etc/gshadow: name=placement Dec 12 13:14:58 np0005557561.novalocal groupadd[75714]: new group: name=placement, GID=979 Dec 12 13:14:58 np0005557561.novalocal useradd[75721]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Dec 12 13:15:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:15:03 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:15:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:15:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:15:03 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:15:04 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:15:04 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:15:04 np0005557561.novalocal systemd[1]: run-r07e44aa61c094774adc481b84a95fc20.service: Deactivated successfully. Dec 12 13:15:05 np0005557561.novalocal groupadd[75893]: group added to /etc/group: name=nova, GID=162 Dec 12 13:15:05 np0005557561.novalocal groupadd[75893]: group added to /etc/gshadow: name=nova Dec 12 13:15:05 np0005557561.novalocal groupadd[75893]: new group: name=nova, GID=162 Dec 12 13:15:05 np0005557561.novalocal useradd[75900]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Dec 12 13:15:05 np0005557561.novalocal useradd[75900]: add 'nova' to group 'nobody' Dec 12 13:15:05 np0005557561.novalocal useradd[75900]: add 'nova' to group 'nova' Dec 12 13:15:05 np0005557561.novalocal useradd[75900]: add 'nova' to shadow group 'nobody' Dec 12 13:15:05 np0005557561.novalocal useradd[75900]: add 'nova' to shadow group 'nova' Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: Converting 2773 SID table entries... Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:15:24 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: Converting 2773 SID table entries... Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:15:33 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: Converting 2773 SID table entries... Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:15:42 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: Converting 2773 SID table entries... Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:15:51 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: Converting 2773 SID table entries... Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:15:59 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:16:03 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=15 res=1 Dec 12 13:16:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:16:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:16:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: Converting 2774 SID table entries... Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:16:10 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:16:10 np0005557561.novalocal groupadd[76063]: group added to /etc/group: name=qemu, GID=107 Dec 12 13:16:10 np0005557561.novalocal groupadd[76063]: group added to /etc/gshadow: name=qemu Dec 12 13:16:10 np0005557561.novalocal groupadd[76063]: new group: name=qemu, GID=107 Dec 12 13:16:10 np0005557561.novalocal useradd[76070]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Dec 12 13:16:10 np0005557561.novalocal useradd[76070]: add 'qemu' to group 'kvm' Dec 12 13:16:10 np0005557561.novalocal useradd[76070]: add 'qemu' to shadow group 'kvm' Dec 12 13:16:11 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:16:11 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=16 res=1 Dec 12 13:16:11 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:16:11 np0005557561.novalocal dbus-broker-launch[752]: Noticed file-system modification, trigger reload. Dec 12 13:16:11 np0005557561.novalocal groupadd[76108]: group added to /etc/group: name=libvirt, GID=978 Dec 12 13:16:11 np0005557561.novalocal groupadd[76108]: group added to /etc/gshadow: name=libvirt Dec 12 13:16:11 np0005557561.novalocal groupadd[76108]: new group: name=libvirt, GID=978 Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 5 rules Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Reloading rules Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Collecting garbage unconditionally... Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Loading rules from directory /etc/polkit-1/rules.d Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 12 13:16:12 np0005557561.novalocal polkitd[9478]: Finished loading, compiling and executing 5 rules Dec 12 13:16:16 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:16:16 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:16:16 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:16 np0005557561.novalocal systemd-rc-local-generator[76814]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:16 np0005557561.novalocal systemd-sysv-generator[76817]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:16 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:18 np0005557561.novalocal sshd-session[77615]: Received disconnect from 193.46.255.217 port 50570:11: [preauth] Dec 12 13:16:18 np0005557561.novalocal sshd-session[77615]: Disconnected from authenticating user root 193.46.255.217 port 50570 [preauth] Dec 12 13:16:20 np0005557561.novalocal groupadd[79310]: group added to /etc/group: name=octavia, GID=977 Dec 12 13:16:20 np0005557561.novalocal groupadd[79310]: group added to /etc/gshadow: name=octavia Dec 12 13:16:20 np0005557561.novalocal groupadd[79310]: new group: name=octavia, GID=977 Dec 12 13:16:20 np0005557561.novalocal useradd[79348]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Dec 12 13:16:22 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:16:22 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:16:22 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.686s CPU time. Dec 12 13:16:22 np0005557561.novalocal systemd[1]: run-r6eaca95326cd447b95c5aefabd56ff56.service: Deactivated successfully. Dec 12 13:16:25 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:26 np0005557561.novalocal systemd-rc-local-generator[80298]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:26 np0005557561.novalocal systemd-sysv-generator[80302]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:26 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:30 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:30 np0005557561.novalocal systemd-rc-local-generator[80344]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:30 np0005557561.novalocal systemd-sysv-generator[80349]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:31 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:33 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:33 np0005557561.novalocal systemd-sysv-generator[80392]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:33 np0005557561.novalocal systemd-rc-local-generator[80387]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:33 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:36 np0005557561.novalocal systemd-rc-local-generator[80427]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:36 np0005557561.novalocal systemd-sysv-generator[80430]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:36 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:38 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:38 np0005557561.novalocal systemd-rc-local-generator[80463]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:38 np0005557561.novalocal systemd-sysv-generator[80468]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:38 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:49 np0005557561.novalocal groupadd[80498]: group added to /etc/group: name=apache, GID=48 Dec 12 13:16:49 np0005557561.novalocal groupadd[80498]: group added to /etc/gshadow: name=apache Dec 12 13:16:49 np0005557561.novalocal groupadd[80498]: new group: name=apache, GID=48 Dec 12 13:16:49 np0005557561.novalocal useradd[80507]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Dec 12 13:16:53 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:53 np0005557561.novalocal systemd-rc-local-generator[80541]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:53 np0005557561.novalocal systemd-sysv-generator[80545]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:54 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:16:54 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:16:54 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:16:54 np0005557561.novalocal systemd-sysv-generator[80647]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:16:54 np0005557561.novalocal systemd-rc-local-generator[80643]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:16:54 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:16:55 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:16:55 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:16:55 np0005557561.novalocal systemd[1]: run-r1ae2cfe7455b4badaf7a0531a71075c9.service: Deactivated successfully. Dec 12 13:17:01 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:17:01 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:17:01 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:17:01 np0005557561.novalocal groupadd[80964]: group added to /etc/group: name=manila, GID=976 Dec 12 13:17:01 np0005557561.novalocal groupadd[80964]: group added to /etc/gshadow: name=manila Dec 12 13:17:01 np0005557561.novalocal groupadd[80964]: new group: name=manila, GID=976 Dec 12 13:17:01 np0005557561.novalocal useradd[80971]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Dec 12 13:17:01 np0005557561.novalocal useradd[80971]: add 'manila' to group 'nobody' Dec 12 13:17:01 np0005557561.novalocal useradd[80971]: add 'manila' to group 'manila' Dec 12 13:17:01 np0005557561.novalocal useradd[80971]: add 'manila' to shadow group 'nobody' Dec 12 13:17:01 np0005557561.novalocal useradd[80971]: add 'manila' to shadow group 'manila' Dec 12 13:17:03 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:17:03 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:17:03 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:03 np0005557561.novalocal systemd-rc-local-generator[81011]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:03 np0005557561.novalocal systemd-sysv-generator[81018]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:03 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:17:03 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:17:03 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:17:03 np0005557561.novalocal systemd[1]: run-r6ed880a4248d47e0a8473bb5d0972ce0.service: Deactivated successfully. Dec 12 13:17:07 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:17:07 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:17:07 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:07 np0005557561.novalocal systemd-rc-local-generator[81220]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:07 np0005557561.novalocal systemd-sysv-generator[81224]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:07 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:17:08 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:17:08 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:17:08 np0005557561.novalocal systemd[1]: run-r00645e85dd414cc3b6f7d654772196ca.service: Deactivated successfully. Dec 12 13:17:09 np0005557561.novalocal kernel: loop: module loaded Dec 12 13:17:09 np0005557561.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Dec 12 13:17:09 np0005557561.novalocal lvm[81662]: PV /dev/loop3 not used. Dec 12 13:17:09 np0005557561.novalocal lvm[81665]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 12 13:17:09 np0005557561.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Dec 12 13:17:09 np0005557561.novalocal lvm[81667]: 0 logical volume(s) in volume group "lvm-shares" now active Dec 12 13:17:09 np0005557561.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Dec 12 13:17:22 np0005557561.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Dec 12 13:17:22 np0005557561.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Dec 12 13:17:22 np0005557561.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Dec 12 13:17:22 np0005557561.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Dec 12 13:17:24 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:17:24 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:17:25 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:17:25 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:17:25 np0005557561.novalocal systemd[1]: run-r50dee53bef504df7bc1f1e284351d011.service: Deactivated successfully. Dec 12 13:17:33 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:33 np0005557561.novalocal systemd-rc-local-generator[81967]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:33 np0005557561.novalocal systemd-sysv-generator[81973]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:33 np0005557561.novalocal systemd[1]: Starting MariaDB 10.5 database server... Dec 12 13:17:33 np0005557561.novalocal mariadb-prepare-db-dir[82002]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Dec 12 13:17:33 np0005557561.novalocal mariadb-prepare-db-dir[82002]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Dec 12 13:17:34 np0005557561.novalocal systemd[1]: Started MariaDB 10.5 database server. Dec 12 13:17:34 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:34 np0005557561.novalocal systemd-rc-local-generator[82113]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:34 np0005557561.novalocal systemd-sysv-generator[82118]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:34 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:34 np0005557561.novalocal systemd-rc-local-generator[82144]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:34 np0005557561.novalocal systemd-sysv-generator[82147]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:35 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:35 np0005557561.novalocal systemd-rc-local-generator[82180]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:35 np0005557561.novalocal systemd-sysv-generator[82184]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:35 np0005557561.novalocal systemd[1]: Starting Redis persistent key-value database... Dec 12 13:17:35 np0005557561.novalocal systemd[1]: Started Redis persistent key-value database. Dec 12 13:17:35 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:35 np0005557561.novalocal systemd-rc-local-generator[82215]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:35 np0005557561.novalocal systemd-sysv-generator[82219]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:35 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:36 np0005557561.novalocal systemd-rc-local-generator[82245]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:36 np0005557561.novalocal systemd-sysv-generator[82248]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:36 np0005557561.novalocal systemd-sysv-generator[82280]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:36 np0005557561.novalocal systemd-rc-local-generator[82276]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:36 np0005557561.novalocal systemd[1]: Starting Redis Sentinel... Dec 12 13:17:36 np0005557561.novalocal systemd[1]: Started Redis Sentinel. Dec 12 13:17:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:37 np0005557561.novalocal systemd-rc-local-generator[82312]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:37 np0005557561.novalocal systemd-sysv-generator[82316]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:37 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:37 np0005557561.novalocal systemd-sysv-generator[82344]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:37 np0005557561.novalocal systemd-rc-local-generator[82339]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:38 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:38 np0005557561.novalocal systemd-rc-local-generator[82418]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:38 np0005557561.novalocal systemd-sysv-generator[82424]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:38 np0005557561.novalocal systemd[1]: Starting OVN northd management daemon... Dec 12 13:17:38 np0005557561.novalocal chown[82431]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Dec 12 13:17:38 np0005557561.novalocal ovn-ctl[82432]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Dec 12 13:17:38 np0005557561.novalocal ovn-ctl[82432]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Dec 12 13:17:38 np0005557561.novalocal ovsdb-server[82534]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Dec 12 13:17:38 np0005557561.novalocal ovsdb-server[82536]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Dec 12 13:17:38 np0005557561.novalocal ovsdb-server[82535]: ovs|00002|vlog(monitor)|INFO|closing log file Dec 12 13:17:38 np0005557561.novalocal ovsdb-server[82535]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Dec 12 13:17:38 np0005557561.novalocal ovn-ctl[82432]: Starting ovsdb-nb [ OK ] Dec 12 13:17:39 np0005557561.novalocal ovn-nbctl[82540]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Dec 12 13:17:39 np0005557561.novalocal ovn-ctl[82432]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Dec 12 13:17:39 np0005557561.novalocal ovn-ctl[82432]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Dec 12 13:17:39 np0005557561.novalocal ovsdb-server[82560]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Dec 12 13:17:39 np0005557561.novalocal ovsdb-server[82562]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Dec 12 13:17:39 np0005557561.novalocal ovsdb-server[82561]: ovs|00002|vlog(monitor)|INFO|closing log file Dec 12 13:17:39 np0005557561.novalocal ovsdb-server[82561]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Dec 12 13:17:39 np0005557561.novalocal ovn-ctl[82432]: Starting ovsdb-sb [ OK ] Dec 12 13:17:39 np0005557561.novalocal ovn-sbctl[82566]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Dec 12 13:17:39 np0005557561.novalocal ovn-ctl[82432]: Starting ovn-northd [ OK ] Dec 12 13:17:39 np0005557561.novalocal systemd[1]: Finished OVN northd management daemon. Dec 12 13:17:39 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:39 np0005557561.novalocal systemd-rc-local-generator[82600]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:39 np0005557561.novalocal systemd-sysv-generator[82606]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:39 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:39 np0005557561.novalocal systemd-rc-local-generator[82631]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:39 np0005557561.novalocal systemd-sysv-generator[82635]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:40 np0005557561.novalocal ovn-nbctl[82644]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Dec 12 13:17:40 np0005557561.novalocal ovn-sbctl[82648]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Dec 12 13:17:40 np0005557561.novalocal sudo[82650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Dec 12 13:17:40 np0005557561.novalocal sudo[82650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:17:40 np0005557561.novalocal sudo[82650]: pam_unix(sudo:session): session closed for user root Dec 12 13:17:40 np0005557561.novalocal ovn-nbctl[82653]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Dec 12 13:17:40 np0005557561.novalocal sudo[82655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Dec 12 13:17:40 np0005557561.novalocal sudo[82655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:17:40 np0005557561.novalocal sudo[82655]: pam_unix(sudo:session): session closed for user root Dec 12 13:17:40 np0005557561.novalocal ovn-sbctl[82658]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Dec 12 13:17:40 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:40 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:40 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:40 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:41 np0005557561.novalocal systemd-rc-local-generator[82706]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:41 np0005557561.novalocal systemd-sysv-generator[82710]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:41 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:41 np0005557561.novalocal systemd[1]: Starting OVN controller daemon... Dec 12 13:17:41 np0005557561.novalocal ovn-ctl[82716]: Starting ovn-controller [ OK ] Dec 12 13:17:41 np0005557561.novalocal systemd[1]: Started OVN controller daemon. Dec 12 13:17:41 np0005557561.novalocal kernel: br-int: entered promiscuous mode Dec 12 13:17:41 np0005557561.novalocal NetworkManager[858]: [1765563461.5090] manager: (br-int): 'openvswitch' plugin not available; creating generic device Dec 12 13:17:41 np0005557561.novalocal NetworkManager[858]: [1765563461.5108] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Dec 12 13:17:41 np0005557561.novalocal systemd-udevd[82773]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:17:41 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:41 np0005557561.novalocal systemd-sysv-generator[82802]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:41 np0005557561.novalocal systemd-rc-local-generator[82797]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:41 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:41 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:41 np0005557561.novalocal systemd-rc-local-generator[82822]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:41 np0005557561.novalocal systemd-sysv-generator[82828]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:42 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: Converting 2799 SID table entries... Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability network_peer_controls=1 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability open_perms=1 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability extended_socket_class=1 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability always_check_network=0 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 12 13:17:43 np0005557561.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 12 13:17:43 np0005557561.novalocal setsebool[82835]: The os_neutron_dac_override policy boolean was changed to on by root Dec 12 13:17:46 np0005557561.novalocal dbus-broker-launch[772]: avc: op=load_policy lsm=selinux seqno=18 res=1 Dec 12 13:17:46 np0005557561.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Dec 12 13:17:46 np0005557561.novalocal lvm[82855]: PV /dev/loop2 not used. Dec 12 13:17:46 np0005557561.novalocal lvm[82858]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:17:46 np0005557561.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Dec 12 13:17:46 np0005557561.novalocal lvm[82860]: 0 logical volume(s) in volume group "cinder-volumes" now active Dec 12 13:17:46 np0005557561.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Dec 12 13:17:49 np0005557561.novalocal ovsdb-server[82536]: ovs|00003|memory|INFO|10368 kB peak resident set size after 10.1 seconds Dec 12 13:17:49 np0005557561.novalocal ovsdb-server[82536]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Dec 12 13:17:49 np0005557561.novalocal ovsdb-server[82562]: ovs|00003|memory|INFO|11120 kB peak resident set size after 10.2 seconds Dec 12 13:17:49 np0005557561.novalocal ovsdb-server[82562]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Dec 12 13:17:56 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:56 np0005557561.novalocal systemd-sysv-generator[82901]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:56 np0005557561.novalocal systemd-rc-local-generator[82898]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:56 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:57 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:17:59 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:17:59 np0005557561.novalocal systemd-rc-local-generator[82937]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:17:59 np0005557561.novalocal systemd-sysv-generator[82941]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:17:59 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:17:59 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:18:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:18:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:18:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:18:04 np0005557561.novalocal groupadd[83009]: group added to /etc/group: name=clevis, GID=975 Dec 12 13:18:04 np0005557561.novalocal groupadd[83009]: group added to /etc/gshadow: name=clevis Dec 12 13:18:04 np0005557561.novalocal groupadd[83009]: new group: name=clevis, GID=975 Dec 12 13:18:04 np0005557561.novalocal useradd[83016]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Dec 12 13:18:04 np0005557561.novalocal usermod[83026]: add 'clevis' to group 'tss' Dec 12 13:18:04 np0005557561.novalocal usermod[83026]: add 'clevis' to shadow group 'tss' Dec 12 13:18:05 np0005557561.novalocal usermod[83039]: add 'nova' to group 'qemu' Dec 12 13:18:05 np0005557561.novalocal usermod[83039]: add 'nova' to shadow group 'qemu' Dec 12 13:18:05 np0005557561.novalocal usermod[83046]: add 'nova' to group 'libvirt' Dec 12 13:18:05 np0005557561.novalocal usermod[83046]: add 'nova' to shadow group 'libvirt' Dec 12 13:18:06 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:18:06 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:18:06 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:18:06 np0005557561.novalocal systemd-rc-local-generator[83125]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:18:06 np0005557561.novalocal systemd-sysv-generator[83128]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:18:06 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:18:06 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:18:09 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:18:09 np0005557561.novalocal systemd-rc-local-generator[85223]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:18:09 np0005557561.novalocal systemd-sysv-generator[85229]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:18:09 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:18:09 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:18:12 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.113s CPU time. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: run-r3973e0154f49455381cb59ee32b6a031.service: Deactivated successfully. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:18:12 np0005557561.novalocal systemd-rc-local-generator[87028]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:18:12 np0005557561.novalocal systemd-sysv-generator[87032]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:18:12 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:18:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:18:15 np0005557561.novalocal systemd-rc-local-generator[87062]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:18:15 np0005557561.novalocal systemd-sysv-generator[87065]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:18:15 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:18:37 np0005557561.novalocal crontab[87122]: (root) LIST (root) Dec 12 13:18:37 np0005557561.novalocal crontab[87123]: (root) LIST (keystone) Dec 12 13:18:37 np0005557561.novalocal crontab[87124]: (root) LIST (cinder) Dec 12 13:18:37 np0005557561.novalocal crontab[87125]: (root) LIST (glance) Dec 12 13:18:37 np0005557561.novalocal crontab[87126]: (root) LIST (nova) Dec 12 13:18:37 np0005557561.novalocal crontab[87127]: (root) LIST (manila) Dec 12 13:18:37 np0005557561.novalocal crontab[87128]: (root) REPLACE (cinder) Dec 12 13:18:37 np0005557561.novalocal crontab[87129]: (root) REPLACE (glance) Dec 12 13:18:38 np0005557561.novalocal crontab[87130]: (root) REPLACE (glance) Dec 12 13:18:43 np0005557561.novalocal crontab[87145]: (root) REPLACE (glance) Dec 12 13:18:43 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:18:43 np0005557561.novalocal systemd-rc-local-generator[87164]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:18:43 np0005557561.novalocal systemd-sysv-generator[87170]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:18:43 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:19:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:19:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:19:16 np0005557561.novalocal crontab[87235]: (root) REPLACE (nova) Dec 12 13:19:24 np0005557561.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 12 13:19:24 np0005557561.novalocal systemd[1]: Starting man-db-cache-update.service... Dec 12 13:19:24 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:24 np0005557561.novalocal systemd-sysv-generator[87284]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:24 np0005557561.novalocal systemd-rc-local-generator[87281]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:24 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:24 np0005557561.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Dec 12 13:19:25 np0005557561.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 12 13:19:25 np0005557561.novalocal systemd[1]: Finished man-db-cache-update.service. Dec 12 13:19:25 np0005557561.novalocal systemd[1]: run-r2738e7d6b2e343fc9998c2d3155820f3.service: Deactivated successfully. Dec 12 13:19:33 np0005557561.novalocal crontab[87382]: (root) REPLACE (manila) Dec 12 13:19:33 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:33 np0005557561.novalocal systemd-rc-local-generator[87402]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:33 np0005557561.novalocal systemd-sysv-generator[87406]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:33 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:34 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:34 np0005557561.novalocal systemd-rc-local-generator[87436]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:34 np0005557561.novalocal systemd-sysv-generator[87440]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:34 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:34 np0005557561.novalocal systemd[87445]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Dec 12 13:19:34 np0005557561.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Dec 12 13:19:34 np0005557561.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Dec 12 13:19:34 np0005557561.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Dec 12 13:19:34 np0005557561.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Dec 12 13:19:34 np0005557561.novalocal systemd[1]: Starting RabbitMQ broker... Dec 12 13:19:35 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:35.287500-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Dec 12 13:19:35 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:35.300984-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Dec 12 13:19:35 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:35.301013-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879290-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879356-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879378-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879410-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879467-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879486-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879505-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Dec 12 13:19:36 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:36.879546-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:37.116170-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: 2025-12-12 13:19:37.116271-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: ## ## RabbitMQ 3.9.21 Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: ## ## Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: ###### ## Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Erlang: 24.3.4.2 [jit] Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Doc guides: https://rabbitmq.com/documentation.html Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Support: https://rabbitmq.com/contact.html Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Tutorials: https://rabbitmq.com/getstarted.html Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Monitoring: https://rabbitmq.com/monitoring.html Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Dec 12 13:19:37 np0005557561.novalocal rabbitmq-server[87446]: Config file(s): /etc/rabbitmq/rabbitmq.config Dec 12 13:19:40 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:19:40 np0005557561.novalocal rabbitmq-server[87446]: Starting broker... completed with 3 plugins. Dec 12 13:19:40 np0005557561.novalocal systemd[1]: Started RabbitMQ broker. Dec 12 13:19:40 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:40 np0005557561.novalocal systemd-rc-local-generator[87551]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:40 np0005557561.novalocal systemd-sysv-generator[87555]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:40 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:40 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:19:40 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:40 np0005557561.novalocal systemd-sysv-generator[87586]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:40 np0005557561.novalocal systemd-rc-local-generator[87583]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:40 np0005557561.novalocal setroubleshoot[87529]: failed to retrieve rpm info for path '/proc/net/if_inet6': Dec 12 13:19:40 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:41 np0005557561.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Dec 12 13:19:41 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Dec 12 13:19:41 np0005557561.novalocal runuser[87599]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:41 np0005557561.novalocal runuser[87599]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:42 np0005557561.novalocal runuser[87655]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:42 np0005557561.novalocal setroubleshoot[87529]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l d4745e41-8ede-4f02-abed-c73e92048fde Dec 12 13:19:42 np0005557561.novalocal setroubleshoot[87529]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Dec 12 13:19:42 np0005557561.novalocal runuser[87655]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:42 np0005557561.novalocal runuser[87708]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:43 np0005557561.novalocal runuser[87708]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:43 np0005557561.novalocal runuser[87762]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:44 np0005557561.novalocal runuser[87762]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:44 np0005557561.novalocal runuser[87816]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:45 np0005557561.novalocal runuser[87816]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:45 np0005557561.novalocal runuser[87868]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:45 np0005557561.novalocal runuser[87868]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:45 np0005557561.novalocal runuser[87920]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:46 np0005557561.novalocal runuser[87920]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:46 np0005557561.novalocal runuser[87972]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:47 np0005557561.novalocal runuser[87972]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:47 np0005557561.novalocal runuser[88024]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:48 np0005557561.novalocal runuser[88024]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:48 np0005557561.novalocal runuser[88078]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:48 np0005557561.novalocal runuser[88078]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:48 np0005557561.novalocal runuser[88130]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:49 np0005557561.novalocal runuser[88130]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:49 np0005557561.novalocal runuser[88182]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:50 np0005557561.novalocal runuser[88182]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:50 np0005557561.novalocal runuser[88236]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:50 np0005557561.novalocal runuser[88236]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:51 np0005557561.novalocal runuser[88288]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:51 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Dec 12 13:19:51 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.177s CPU time. Dec 12 13:19:51 np0005557561.novalocal runuser[88288]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:51 np0005557561.novalocal runuser[88340]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:19:52 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:19:52 np0005557561.novalocal runuser[88340]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:19:53 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:53 np0005557561.novalocal systemd-sysv-generator[88422]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:53 np0005557561.novalocal systemd-rc-local-generator[88418]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:53 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:53 np0005557561.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Dec 12 13:19:53 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:53 np0005557561.novalocal systemd-rc-local-generator[88448]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:53 np0005557561.novalocal systemd-sysv-generator[88453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:54 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:54 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:54 np0005557561.novalocal systemd-rc-local-generator[88482]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:54 np0005557561.novalocal systemd-sysv-generator[88487]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:54 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:54 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:55 np0005557561.novalocal systemd-rc-local-generator[88513]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:55 np0005557561.novalocal systemd-sysv-generator[88517]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:55 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:55 np0005557561.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Dec 12 13:19:55 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:55 np0005557561.novalocal systemd-rc-local-generator[88548]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:55 np0005557561.novalocal systemd-sysv-generator[88552]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:55 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:55 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:56 np0005557561.novalocal systemd-rc-local-generator[88575]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:56 np0005557561.novalocal systemd-sysv-generator[88580]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:56 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:56 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:56 np0005557561.novalocal systemd-rc-local-generator[88608]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:56 np0005557561.novalocal systemd-sysv-generator[88611]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:56 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:56 np0005557561.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:57 np0005557561.novalocal systemd-rc-local-generator[88647]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:57 np0005557561.novalocal systemd-sysv-generator[88650]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:57 np0005557561.novalocal sudo[88658]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Created slice User Slice of UID 0. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Starting User Manager for UID 0... Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:57 np0005557561.novalocal systemd-rc-local-generator[88689]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:57 np0005557561.novalocal systemd-sysv-generator[88692]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Queued start job for default target Main User Target. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Created slice User Application Slice. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Started Daily Cleanup of User's Temporary Directories. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Reached target Paths. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Reached target Timers. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Starting D-Bus User Message Bus Socket... Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Starting Create User's Volatile Files and Directories... Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Listening on D-Bus User Message Bus Socket. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Reached target Sockets. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Finished Create User's Volatile Files and Directories. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Reached target Basic System. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Reached target Main User Target. Dec 12 13:19:57 np0005557561.novalocal systemd[88664]: Startup finished in 226ms. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Started User Manager for UID 0. Dec 12 13:19:57 np0005557561.novalocal systemd[1]: Started Session c1 of User root. Dec 12 13:19:57 np0005557561.novalocal sudo[88658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:19:58 np0005557561.novalocal sudo[88658]: pam_unix(sudo:session): session closed for user root Dec 12 13:19:58 np0005557561.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Dec 12 13:19:58 np0005557561.novalocal sudo[88709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Started Session c2 of User root. Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:58 np0005557561.novalocal systemd-rc-local-generator[88730]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:58 np0005557561.novalocal systemd-sysv-generator[88734]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:58 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:58 np0005557561.novalocal sudo[88709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Dec 12 13:19:58 np0005557561.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Dec 12 13:19:58 np0005557561.novalocal target[88742]: No saved config file at /etc/target/saveconfig.json, ok, exiting Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Dec 12 13:19:58 np0005557561.novalocal sudo[88709]: pam_unix(sudo:session): session closed for user root Dec 12 13:19:58 np0005557561.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Dec 12 13:19:58 np0005557561.novalocal sudo[88751]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Started Session c3 of User root. Dec 12 13:19:58 np0005557561.novalocal sudo[88751]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:19:58 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:59 np0005557561.novalocal systemd-rc-local-generator[88776]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:59 np0005557561.novalocal systemd-sysv-generator[88779]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:59 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:59 np0005557561.novalocal sudo[88751]: pam_unix(sudo:session): session closed for user root Dec 12 13:19:59 np0005557561.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Dec 12 13:19:59 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:19:59 np0005557561.novalocal systemd-sysv-generator[88811]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:19:59 np0005557561.novalocal systemd-rc-local-generator[88805]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:19:59 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:19:59 np0005557561.novalocal sudo[88786]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Dec 12 13:19:59 np0005557561.novalocal systemd[1]: Started Session c4 of User root. Dec 12 13:19:59 np0005557561.novalocal sudo[88786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:19:59 np0005557561.novalocal runuser[88818]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:20:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:20:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:20:00 np0005557561.novalocal systemd[1]: Started Device-mapper event daemon. Dec 12 13:20:00 np0005557561.novalocal dmeventd[88898]: dmeventd ready for processing. Dec 12 13:20:00 np0005557561.novalocal dmeventd[88898]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Dec 12 13:20:00 np0005557561.novalocal lvm[88905]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:20:00 np0005557561.novalocal lvm[88905]: VG cinder-volumes finished Dec 12 13:20:00 np0005557561.novalocal sudo[88786]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:00 np0005557561.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Dec 12 13:20:00 np0005557561.novalocal runuser[88818]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:00 np0005557561.novalocal sudo[88913]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Dec 12 13:20:00 np0005557561.novalocal systemd[1]: Started Session c5 of User root. Dec 12 13:20:00 np0005557561.novalocal sudo[88913]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:00 np0005557561.novalocal runuser[88914]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:00 np0005557561.novalocal sudo[88913]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:00 np0005557561.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Dec 12 13:20:00 np0005557561.novalocal sudo[88963]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Dec 12 13:20:00 np0005557561.novalocal systemd[1]: Started Session c6 of User root. Dec 12 13:20:00 np0005557561.novalocal sudo[88963]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:01 np0005557561.novalocal runuser[88914]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:01 np0005557561.novalocal sudo[88963]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:01 np0005557561.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Dec 12 13:20:01 np0005557561.novalocal sudo[88976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:20:01 np0005557561.novalocal systemd[1]: Started Session c7 of User root. Dec 12 13:20:01 np0005557561.novalocal runuser[88975]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:01 np0005557561.novalocal sudo[88976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:01 np0005557561.novalocal sudo[88976]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:01 np0005557561.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Dec 12 13:20:01 np0005557561.novalocal sudo[89024]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:20:01 np0005557561.novalocal systemd[1]: Started Session c8 of User root. Dec 12 13:20:01 np0005557561.novalocal sudo[89024]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:01 np0005557561.novalocal runuser[88975]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:01 np0005557561.novalocal runuser[89035]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:01 np0005557561.novalocal sudo[89024]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:01 np0005557561.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Dec 12 13:20:01 np0005557561.novalocal sudo[89052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:01 np0005557561.novalocal systemd[1]: Started Session c9 of User root. Dec 12 13:20:01 np0005557561.novalocal sudo[89052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:02 np0005557561.novalocal sudo[89052]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:02 np0005557561.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Dec 12 13:20:02 np0005557561.novalocal sudo[89084]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:20:02 np0005557561.novalocal systemd[1]: Started Session c10 of User root. Dec 12 13:20:02 np0005557561.novalocal sudo[89084]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:02 np0005557561.novalocal runuser[89035]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:02 np0005557561.novalocal sudo[89084]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:02 np0005557561.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Dec 12 13:20:02 np0005557561.novalocal sudo[89099]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 12 13:20:02 np0005557561.novalocal systemd[1]: Started Session c11 of User root. Dec 12 13:20:02 np0005557561.novalocal sudo[89099]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:02 np0005557561.novalocal runuser[89100]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:03 np0005557561.novalocal sudo[89099]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:03 np0005557561.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Dec 12 13:20:03 np0005557561.novalocal sudo[89149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Dec 12 13:20:03 np0005557561.novalocal systemd[1]: Started Session c12 of User root. Dec 12 13:20:03 np0005557561.novalocal sudo[89149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:03 np0005557561.novalocal runuser[89100]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:03 np0005557561.novalocal runuser[89160]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:03 np0005557561.novalocal sudo[89149]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:03 np0005557561.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Dec 12 13:20:03 np0005557561.novalocal sudo[89177]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:20:03 np0005557561.novalocal systemd[1]: Started Session c13 of User root. Dec 12 13:20:03 np0005557561.novalocal sudo[89177]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:03 np0005557561.novalocal sudo[89177]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:03 np0005557561.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Dec 12 13:20:03 np0005557561.novalocal sudo[89209]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:03 np0005557561.novalocal systemd[1]: Started Session c14 of User root. Dec 12 13:20:03 np0005557561.novalocal sudo[89209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:04 np0005557561.novalocal runuser[89160]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:04 np0005557561.novalocal runuser[89219]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:04 np0005557561.novalocal sudo[89209]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:04 np0005557561.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Dec 12 13:20:04 np0005557561.novalocal sudo[89265]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:20:04 np0005557561.novalocal systemd[1]: Started Session c15 of User root. Dec 12 13:20:04 np0005557561.novalocal sudo[89265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:04 np0005557561.novalocal sudo[89265]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:04 np0005557561.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Dec 12 13:20:04 np0005557561.novalocal sudo[89273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:04 np0005557561.novalocal systemd[1]: Started Session c16 of User root. Dec 12 13:20:04 np0005557561.novalocal sudo[89273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:04 np0005557561.novalocal runuser[89219]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:04 np0005557561.novalocal runuser[89279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:05 np0005557561.novalocal sudo[89273]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:05 np0005557561.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Dec 12 13:20:05 np0005557561.novalocal sudo[89325]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:20:05 np0005557561.novalocal systemd[1]: Started Session c17 of User root. Dec 12 13:20:05 np0005557561.novalocal sudo[89325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:05 np0005557561.novalocal sudo[89325]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:05 np0005557561.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Dec 12 13:20:05 np0005557561.novalocal runuser[89279]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:05 np0005557561.novalocal sudo[89336]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:05 np0005557561.novalocal systemd[1]: Started Session c18 of User root. Dec 12 13:20:05 np0005557561.novalocal sudo[89336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:06 np0005557561.novalocal sudo[89336]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:06 np0005557561.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Dec 12 13:20:06 np0005557561.novalocal sudo[89344]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:20:06 np0005557561.novalocal systemd[1]: Started Session c19 of User root. Dec 12 13:20:06 np0005557561.novalocal sudo[89344]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:06 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:06 np0005557561.novalocal systemd-rc-local-generator[89370]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:06 np0005557561.novalocal sudo[89344]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:06 np0005557561.novalocal systemd-sysv-generator[89373]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:06 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:06 np0005557561.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Dec 12 13:20:06 np0005557561.novalocal sudo[89379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:06 np0005557561.novalocal systemd[1]: Started Session c20 of User root. Dec 12 13:20:06 np0005557561.novalocal sudo[89379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:06 np0005557561.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Dec 12 13:20:06 np0005557561.novalocal sudo[89379]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:06 np0005557561.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Dec 12 13:20:07 np0005557561.novalocal neutron-rpc-server[89383]: This program is using eventlet and has been monkey_patched Dec 12 13:20:07 np0005557561.novalocal sudo[89386]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:20:07 np0005557561.novalocal systemd[1]: Started Session c21 of User root. Dec 12 13:20:07 np0005557561.novalocal sudo[89386]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:07 np0005557561.novalocal sudo[89386]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:07 np0005557561.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Dec 12 13:20:07 np0005557561.novalocal sudo[89394]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:07 np0005557561.novalocal systemd[1]: Started Session c22 of User root. Dec 12 13:20:07 np0005557561.novalocal sudo[89394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:07 np0005557561.novalocal sudo[89394]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:07 np0005557561.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Dec 12 13:20:07 np0005557561.novalocal sudo[89398]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:20:07 np0005557561.novalocal systemd[1]: Started Session c23 of User root. Dec 12 13:20:07 np0005557561.novalocal sudo[89398]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:08 np0005557561.novalocal sudo[89398]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:08 np0005557561.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Dec 12 13:20:08 np0005557561.novalocal sudo[89402]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:20:08 np0005557561.novalocal systemd[1]: Started Session c24 of User root. Dec 12 13:20:08 np0005557561.novalocal sudo[89402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:20:08 np0005557561.novalocal sudo[89402]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:08 np0005557561.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Dec 12 13:20:09 np0005557561.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Dec 12 13:20:09 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:09 np0005557561.novalocal systemd-rc-local-generator[89429]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:09 np0005557561.novalocal systemd-sysv-generator[89432]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:09 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:09 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:09 np0005557561.novalocal systemd-rc-local-generator[89463]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:09 np0005557561.novalocal systemd-sysv-generator[89466]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:09 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:10 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:10 np0005557561.novalocal systemd-rc-local-generator[89494]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:10 np0005557561.novalocal systemd-sysv-generator[89497]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:10 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:10 np0005557561.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Dec 12 13:20:11 np0005557561.novalocal neutron-periodic-workers[89504]: This program is using eventlet and has been monkey_patched Dec 12 13:20:13 np0005557561.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Dec 12 13:20:13 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:13 np0005557561.novalocal systemd-rc-local-generator[89532]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:13 np0005557561.novalocal systemd-sysv-generator[89537]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:13 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:13 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:14 np0005557561.novalocal systemd-rc-local-generator[89560]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:14 np0005557561.novalocal systemd-sysv-generator[89566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:14 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:14 np0005557561.novalocal sshd-session[89509]: Invalid user ubuntu from 103.197.132.174 port 51628 Dec 12 13:20:14 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:14 np0005557561.novalocal systemd-sysv-generator[89597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:14 np0005557561.novalocal systemd-rc-local-generator[89592]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:14 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:14 np0005557561.novalocal sshd-session[89509]: Received disconnect from 103.197.132.174 port 51628:11: [preauth] Dec 12 13:20:14 np0005557561.novalocal sshd-session[89509]: Disconnected from invalid user ubuntu 103.197.132.174 port 51628 [preauth] Dec 12 13:20:15 np0005557561.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Dec 12 13:20:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:15 np0005557561.novalocal systemd-sysv-generator[89632]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:15 np0005557561.novalocal systemd-rc-local-generator[89628]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:15 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:15 np0005557561.novalocal systemd-sysv-generator[89659]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:15 np0005557561.novalocal systemd-rc-local-generator[89655]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:15 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:16 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:16 np0005557561.novalocal systemd-rc-local-generator[89692]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:16 np0005557561.novalocal systemd-sysv-generator[89695]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:16 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:16 np0005557561.novalocal sudo[89708]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpgboyfm7d/privsep.sock Dec 12 13:20:16 np0005557561.novalocal systemd[1]: Started Session c25 of User root. Dec 12 13:20:16 np0005557561.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Dec 12 13:20:16 np0005557561.novalocal sudo[89708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:20:16 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:16 np0005557561.novalocal systemd-sysv-generator[89738]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:16 np0005557561.novalocal systemd-rc-local-generator[89732]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:17 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:17 np0005557561.novalocal neutron-ovn-vpn-agent[89711]: This program is using eventlet and has been monkey_patched Dec 12 13:20:17 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:17 np0005557561.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Dec 12 13:20:17 np0005557561.novalocal systemd-rc-local-generator[89770]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:17 np0005557561.novalocal systemd-sysv-generator[89773]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:17 np0005557561.novalocal sudo[89708]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:17 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:17 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:17 np0005557561.novalocal systemd-sysv-generator[89808]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:17 np0005557561.novalocal systemd-rc-local-generator[89804]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:17 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:18 np0005557561.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Dec 12 13:20:18 np0005557561.novalocal neutron-ovn-maintenance-worker[89817]: This program is using eventlet and has been monkey_patched Dec 12 13:20:18 np0005557561.novalocal sudo[89828]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp_t933uia/privsep.sock Dec 12 13:20:19 np0005557561.novalocal systemd[1]: Started Session c26 of User root. Dec 12 13:20:19 np0005557561.novalocal sudo[89828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:20:20 np0005557561.novalocal sudo[89828]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:21 np0005557561.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Dec 12 13:20:21 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:21 np0005557561.novalocal systemd-rc-local-generator[89865]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:21 np0005557561.novalocal systemd-sysv-generator[89869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:21 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:22 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:22 np0005557561.novalocal systemd-sysv-generator[89900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:22 np0005557561.novalocal systemd-rc-local-generator[89896]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:22 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:22 np0005557561.novalocal runuser[89905]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:23 np0005557561.novalocal runuser[89905]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:23 np0005557561.novalocal runuser[89957]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:23 np0005557561.novalocal runuser[89957]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:24 np0005557561.novalocal runuser[90010]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:24 np0005557561.novalocal runuser[90010]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:24 np0005557561.novalocal runuser[90062]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:25 np0005557561.novalocal runuser[90062]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:26 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:26 np0005557561.novalocal systemd-rc-local-generator[90138]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:26 np0005557561.novalocal systemd-sysv-generator[90144]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:26 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:26 np0005557561.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Dec 12 13:20:26 np0005557561.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Dec 12 13:20:26 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:26 np0005557561.novalocal systemd-sysv-generator[90173]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:26 np0005557561.novalocal systemd-rc-local-generator[90170]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:26 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:27 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:27 np0005557561.novalocal systemd-rc-local-generator[90204]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:27 np0005557561.novalocal systemd-sysv-generator[90207]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:27 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:27 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:28 np0005557561.novalocal systemd-rc-local-generator[90238]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:28 np0005557561.novalocal systemd-sysv-generator[90243]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Listening on libvirt locking daemon socket. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Starting libvirt locking daemon... Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Started libvirt locking daemon. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:28 np0005557561.novalocal systemd-rc-local-generator[90271]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:28 np0005557561.novalocal systemd-sysv-generator[90274]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:28 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:29 np0005557561.novalocal systemd-rc-local-generator[90298]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:29 np0005557561.novalocal systemd-sysv-generator[90302]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:29 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:29 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:29 np0005557561.novalocal systemd-sysv-generator[90336]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:29 np0005557561.novalocal systemd-rc-local-generator[90329]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:29 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Listening on libvirt logging daemon socket. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Starting libvirt logging daemon... Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Started libvirt logging daemon. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:30 np0005557561.novalocal systemd-rc-local-generator[90365]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:30 np0005557561.novalocal systemd-sysv-generator[90369]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:30 np0005557561.novalocal systemd-rc-local-generator[90395]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:30 np0005557561.novalocal systemd-sysv-generator[90400]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:30 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:31 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:31 np0005557561.novalocal systemd-sysv-generator[90431]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:31 np0005557561.novalocal systemd-rc-local-generator[90427]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:31 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:31 np0005557561.novalocal systemd[1]: Listening on libvirt secret daemon socket. Dec 12 13:20:32 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:32 np0005557561.novalocal systemd-sysv-generator[90465]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:32 np0005557561.novalocal systemd-rc-local-generator[90459]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:32 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:32 np0005557561.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Dec 12 13:20:33 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:33 np0005557561.novalocal systemd-sysv-generator[90502]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:33 np0005557561.novalocal systemd-rc-local-generator[90498]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:33 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:33 np0005557561.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Dec 12 13:20:34 np0005557561.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Closed libvirt proxy daemon socket. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Dec 12 13:20:34 np0005557561.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:35 np0005557561.novalocal systemd-sysv-generator[90543]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:35 np0005557561.novalocal systemd-rc-local-generator[90539]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Listening on libvirt storage daemon socket. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Starting libvirt QEMU daemon... Dec 12 13:20:35 np0005557561.novalocal systemd[1]: Started libvirt QEMU daemon. Dec 12 13:20:35 np0005557561.novalocal virtqemud[90554]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Dec 12 13:20:35 np0005557561.novalocal virtqemud[90554]: hostname: np0005557561.novalocal Dec 12 13:20:35 np0005557561.novalocal virtqemud[90554]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 12 13:20:35 np0005557561.novalocal virtqemud[90554]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 12 13:20:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:36 np0005557561.novalocal systemd-rc-local-generator[90601]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:36 np0005557561.novalocal systemd-sysv-generator[90605]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:36 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:36 np0005557561.novalocal systemd[1]: Reached target libvirt guests shutdown target. Dec 12 13:20:36 np0005557561.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Dec 12 13:20:36 np0005557561.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Dec 12 13:20:36 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:37 np0005557561.novalocal systemd-rc-local-generator[90640]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:37 np0005557561.novalocal systemd-sysv-generator[90643]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:37 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:37 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:37 np0005557561.novalocal systemd-sysv-generator[90670]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:37 np0005557561.novalocal systemd-rc-local-generator[90665]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:37 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:38 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:38 np0005557561.novalocal systemd-rc-local-generator[90704]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:38 np0005557561.novalocal systemd-sysv-generator[90707]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:38 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:38 np0005557561.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Dec 12 13:20:38 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:39 np0005557561.novalocal systemd-rc-local-generator[90736]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:39 np0005557561.novalocal systemd-sysv-generator[90739]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:39 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:39 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:39 np0005557561.novalocal systemd-rc-local-generator[90764]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:39 np0005557561.novalocal systemd-sysv-generator[90769]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:39 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:39 np0005557561.novalocal runuser[90775]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:40 np0005557561.novalocal runuser[90775]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:40 np0005557561.novalocal runuser[90865]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:41 np0005557561.novalocal runuser[90865]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:41 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:20:41 np0005557561.novalocal runuser[90919]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:41 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:20:41 np0005557561.novalocal runuser[90919]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:41 np0005557561.novalocal runuser[90974]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:41 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Dec 12 13:20:42 np0005557561.novalocal runuser[90974]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:43 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 61e53eb1-26f3-49c6-803f-69d64dd73561 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l e73d161f-6ebd-4662-b8d1-46413c170656 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 4ae4817d-73c3-410c-be53-e40df2fa8cb8 Dec 12 13:20:43 np0005557561.novalocal systemd-rc-local-generator[91065]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal systemd-sysv-generator[91069]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 34f01630-0375-48c1-af76-ca7e8952bbf8 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 4c07dd66-5bb7-4d04-afd2-e8f1ee223efc Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l b6a8b643-f293-4bcc-9a38-02d9065f7605 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 99098f4c-4327-4da4-9469-f27decec5c14 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 6fd32280-0132-4261-9346-31d75f8cd9de Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l bd8d3112-cac8-42b3-931f-09c7ad4c4c12 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 1edfced7-64ea-4904-bf07-34867255bdb4 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l b6f38235-e3c8-416c-97a1-b838ac2fa5f7 Dec 12 13:20:43 np0005557561.novalocal setroubleshoot[90918]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Dec 12 13:20:43 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:43 np0005557561.novalocal systemd-sysv-generator[91106]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:43 np0005557561.novalocal systemd-rc-local-generator[91102]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:43 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:44 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:44 np0005557561.novalocal systemd-sysv-generator[91137]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:44 np0005557561.novalocal systemd-rc-local-generator[91134]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:44 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:44 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:44 np0005557561.novalocal systemd-sysv-generator[91168]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:44 np0005557561.novalocal systemd-rc-local-generator[91165]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:44 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:45 np0005557561.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Dec 12 13:20:45 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:45 np0005557561.novalocal systemd-rc-local-generator[91192]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:45 np0005557561.novalocal systemd-sysv-generator[91198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:45 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:45 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:45 np0005557561.novalocal systemd-rc-local-generator[91231]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:45 np0005557561.novalocal systemd-sysv-generator[91234]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:45 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:46 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:46 np0005557561.novalocal systemd-rc-local-generator[91261]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:46 np0005557561.novalocal systemd-sysv-generator[91266]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:46 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:46 np0005557561.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Dec 12 13:20:47 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:47 np0005557561.novalocal systemd-rc-local-generator[91295]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:47 np0005557561.novalocal systemd-sysv-generator[91299]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:47 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:47 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:47 np0005557561.novalocal systemd-rc-local-generator[91325]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:47 np0005557561.novalocal systemd-sysv-generator[91328]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:47 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:47 np0005557561.novalocal runuser[91333]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:48 np0005557561.novalocal runuser[91333]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:48 np0005557561.novalocal runuser[91385]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:49 np0005557561.novalocal runuser[91385]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:49 np0005557561.novalocal runuser[91442]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:49 np0005557561.novalocal runuser[91442]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:49 np0005557561.novalocal runuser[91494]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:20:50 np0005557561.novalocal runuser[91494]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:20:51 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:51 np0005557561.novalocal systemd-rc-local-generator[91592]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:51 np0005557561.novalocal systemd-sysv-generator[91597]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:51 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:51 np0005557561.novalocal systemd[1]: Started OpenStack Manila Scheduler. Dec 12 13:20:51 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:51 np0005557561.novalocal systemd-sysv-generator[91626]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:51 np0005557561.novalocal systemd-rc-local-generator[91623]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:51 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:52 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:52 np0005557561.novalocal systemd-sysv-generator[91656]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:52 np0005557561.novalocal systemd-rc-local-generator[91653]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:52 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:52 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:52 np0005557561.novalocal systemd-sysv-generator[91693]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:52 np0005557561.novalocal systemd-rc-local-generator[91690]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: Started OpenStack Manila Share Service. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:53 np0005557561.novalocal systemd-rc-local-generator[91722]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:53 np0005557561.novalocal systemd-sysv-generator[91727]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.434s CPU time. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.149s CPU time. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:53 np0005557561.novalocal systemd-rc-local-generator[91751]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:53 np0005557561.novalocal systemd-sysv-generator[91755]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:53 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:54 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:54 np0005557561.novalocal systemd-rc-local-generator[91788]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:54 np0005557561.novalocal systemd-sysv-generator[91792]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:54 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:54 np0005557561.novalocal sudo[91795]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp7pef0b2s/privsep.sock Dec 12 13:20:54 np0005557561.novalocal systemd[1]: Started Session c27 of User root. Dec 12 13:20:54 np0005557561.novalocal sudo[91795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Dec 12 13:20:54 np0005557561.novalocal systemd[1]: Started OpenStack Manila Data Server. Dec 12 13:20:55 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:55 np0005557561.novalocal systemd-sysv-generator[91820]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:55 np0005557561.novalocal systemd-rc-local-generator[91817]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:55 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:55 np0005557561.novalocal sudo[91795]: pam_unix(sudo:session): session closed for user root Dec 12 13:20:55 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:55 np0005557561.novalocal systemd-rc-local-generator[91853]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:55 np0005557561.novalocal systemd-sysv-generator[91857]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:55 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:56 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:20:56 np0005557561.novalocal systemd-rc-local-generator[91891]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:20:56 np0005557561.novalocal systemd-sysv-generator[91894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:20:56 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:20:56 np0005557561.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Dec 12 13:20:56 np0005557561.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Dec 12 13:20:56 np0005557561.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Dec 12 13:20:56 np0005557561.novalocal systemd[1]: Starting The Apache HTTP Server... Dec 12 13:20:57 np0005557561.novalocal python3[91904]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Dec 12 13:20:57 np0005557561.novalocal python3[91904]: version_info = version.StrictVersion(__version__).version Dec 12 13:21:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:21:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:21:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:21:00 np0005557561.novalocal python3[91907]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Dec 12 13:21:00 np0005557561.novalocal python3[91907]: version_info = version.StrictVersion(__version__).version Dec 12 13:21:03 np0005557561.novalocal httpd[91920]: Server configured, listening on: ::1 port 9876, ... Dec 12 13:21:03 np0005557561.novalocal systemd[1]: Started The Apache HTTP Server. Dec 12 13:21:04 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:21:04 np0005557561.novalocal systemd-sysv-generator[92035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:21:04 np0005557561.novalocal systemd-rc-local-generator[92029]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:21:04 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:21:04 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:21:04 np0005557561.novalocal systemd-sysv-generator[92070]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:21:04 np0005557561.novalocal systemd-rc-local-generator[92067]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:21:04 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:21:04 np0005557561.novalocal crontab[92076]: (root) REPLACE (keystone) Dec 12 13:21:06 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:21:07 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:21:07 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Dec 12 13:21:08 np0005557561.novalocal sudo[92097]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 5748f087-267a-457d-875a-5ee07ef8b455 Dec 12 13:21:08 np0005557561.novalocal systemd[1]: Started Session c28 of User root. Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:21:08 np0005557561.novalocal sudo[92097]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l bb9f22d2-ff8a-4868-9735-8c28f6857a84 Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 90c46214-0cc7-4d3a-9f5e-cd2b5f5b5ca0 Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3': Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 1888d754-1045-42f8-83f3-fd79f561c623 Dec 12 13:21:08 np0005557561.novalocal setroubleshoot[92083]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:21:09 np0005557561.novalocal sudo[92097]: pam_unix(sudo:session): session closed for user root Dec 12 13:21:09 np0005557561.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Dec 12 13:21:09 np0005557561.novalocal sudo[92102]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:21:09 np0005557561.novalocal systemd[1]: Started Session c29 of User root. Dec 12 13:21:09 np0005557561.novalocal sudo[92102]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:21:09 np0005557561.novalocal sudo[92102]: pam_unix(sudo:session): session closed for user root Dec 12 13:21:09 np0005557561.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Dec 12 13:21:09 np0005557561.novalocal sudo[92107]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:21:09 np0005557561.novalocal systemd[1]: Started Session c30 of User root. Dec 12 13:21:09 np0005557561.novalocal sudo[92107]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:21:10 np0005557561.novalocal sudo[92107]: pam_unix(sudo:session): session closed for user root Dec 12 13:21:10 np0005557561.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Dec 12 13:21:10 np0005557561.novalocal sudo[92111]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:21:10 np0005557561.novalocal systemd[1]: Started Session c31 of User root. Dec 12 13:21:10 np0005557561.novalocal sudo[92111]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:21:10 np0005557561.novalocal sudo[92111]: pam_unix(sudo:session): session closed for user root Dec 12 13:21:10 np0005557561.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Dec 12 13:21:19 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Dec 12 13:21:19 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.229s CPU time. Dec 12 13:21:19 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:21:19 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.176s CPU time. Dec 12 13:21:47 np0005557561.novalocal octavia-health-manager[91276]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Dec 12 13:21:47 np0005557561.novalocal octavia-health-manager[91276]: self.model_class.amphora_id.in_(expired_ids_query) Dec 12 13:22:02 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:22:02 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:22:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:22:08 np0005557561.novalocal sudo[92254]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:22:08 np0005557561.novalocal systemd[1]: Started Session c32 of User root. Dec 12 13:22:08 np0005557561.novalocal sudo[92254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:22:09 np0005557561.novalocal sudo[92254]: pam_unix(sudo:session): session closed for user root Dec 12 13:22:09 np0005557561.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Dec 12 13:22:09 np0005557561.novalocal sudo[92259]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:22:09 np0005557561.novalocal systemd[1]: Started Session c33 of User root. Dec 12 13:22:09 np0005557561.novalocal sudo[92259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:22:09 np0005557561.novalocal sudo[92259]: pam_unix(sudo:session): session closed for user root Dec 12 13:22:09 np0005557561.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Dec 12 13:22:09 np0005557561.novalocal sudo[92265]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:22:09 np0005557561.novalocal systemd[1]: Started Session c34 of User root. Dec 12 13:22:09 np0005557561.novalocal sudo[92265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:22:10 np0005557561.novalocal sudo[92265]: pam_unix(sudo:session): session closed for user root Dec 12 13:22:10 np0005557561.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Dec 12 13:22:10 np0005557561.novalocal sudo[92269]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:22:10 np0005557561.novalocal systemd[1]: Started Session c35 of User root. Dec 12 13:22:10 np0005557561.novalocal sudo[92269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:22:10 np0005557561.novalocal sudo[92269]: pam_unix(sudo:session): session closed for user root Dec 12 13:22:10 np0005557561.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Dec 12 13:22:29 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:22:30 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:22:30 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Dec 12 13:22:31 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l c8a1513a-d775-457a-9009-dfcf889d3647 Dec 12 13:22:31 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:22:31 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cb11923f-5d46-4ae2-aa56-8f0c4666eff4 Dec 12 13:22:31 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:22:31 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 2c0e13dc-fca1-476a-8401-b6b00cbbc2ef Dec 12 13:22:32 np0005557561.novalocal setroubleshoot[92312]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:22:36 np0005557561.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Dec 12 13:22:42 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Dec 12 13:22:42 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.191s CPU time. Dec 12 13:22:42 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:22:42 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.157s CPU time. Dec 12 13:22:58 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:22:59 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:22:59 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Dec 12 13:23:00 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l c8a1513a-d775-457a-9009-dfcf889d3647 Dec 12 13:23:00 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:23:01 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cb11923f-5d46-4ae2-aa56-8f0c4666eff4 Dec 12 13:23:01 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:23:01 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 2c0e13dc-fca1-476a-8401-b6b00cbbc2ef Dec 12 13:23:01 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:23:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:23:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:23:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:23:05 np0005557561.novalocal sudo[92454]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 cinder-volumes/cinder-volumes-pool Dec 12 13:23:05 np0005557561.novalocal systemd[1]: Started Session c36 of User root. Dec 12 13:23:05 np0005557561.novalocal sudo[92454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:05 np0005557561.novalocal dmeventd[88898]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Dec 12 13:23:06 np0005557561.novalocal dmeventd[88898]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 12 13:23:06 np0005557561.novalocal lvm[92510]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:23:06 np0005557561.novalocal lvm[92510]: VG cinder-volumes finished Dec 12 13:23:07 np0005557561.novalocal sudo[92454]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:07 np0005557561.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Dec 12 13:23:08 np0005557561.novalocal sudo[92512]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp_kpmioy2/privsep.sock Dec 12 13:23:08 np0005557561.novalocal systemd[1]: Started Session c37 of User root. Dec 12 13:23:08 np0005557561.novalocal sudo[92512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 77891096-166a-4010-b97f-7884b716f303 Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 3192d326-dd65-4403-bc12-948e204f6e7f Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l c6e79fcb-8579-4a93-a387-62fec54880f5 Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84c10163-83b7-4384-b975-229842a58bf2 Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e2ccf59-6a7b-4568-a8fa-7a34a211cf79 Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l ccf78712-aa91-4258-83b9-93a95ccfd467 Dec 12 13:23:08 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:08 np0005557561.novalocal sudo[92520]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:23:08 np0005557561.novalocal systemd[1]: Started Session c38 of User root. Dec 12 13:23:08 np0005557561.novalocal sudo[92520]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:09 np0005557561.novalocal sudo[92512]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 7a517b98-2310-46e2-95c8-977b6172596b Dec 12 13:23:09 np0005557561.novalocal sudo[92520]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:09 np0005557561.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Dec 12 13:23:09 np0005557561.novalocal sudo[92539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:23:09 np0005557561.novalocal systemd[1]: Started Session c39 of User root. Dec 12 13:23:09 np0005557561.novalocal sudo[92539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 08ff53aa-db80-4c2e-a292-0f6e1abbcce3 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: failed to retrieve rpm info for path '/dev/vda1': Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 14e0bf2a-36a8-4832-828c-f9ca5bdf03cf Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal sudo[92550]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal systemd[1]: Started Session c40 of User root. Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 376cb212-fe74-469e-9640-3e55bcb1cc0f Dec 12 13:23:09 np0005557561.novalocal sudo[92550]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 4ecfdb2d-2091-4172-9cd1-5423e49ccd18 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l b1e98a94-473f-408d-9948-8b31aa827685 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 4dc743be-b1e6-4843-a7b0-806f9716fba2 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-zDxPIo. For complete SELinux messages run: sealert -l 8a8452b7-dc5b-472e-8b91-aaa9f1a9fbc6 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-zDxPIo. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-zDxPIo file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-zDxPIo. For complete SELinux messages run: sealert -l d52fb7ff-3e56-420a-b62b-7e89a533720a Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-zDxPIo. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-zDxPIo file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d44d313d-f12d-4a6f-ae9c-2f151e66e172 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 1b892598-56f4-45fd-abc8-faf44245d405 Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l fd9c8a0c-e8e3-4b67-b644-6ad33042755d Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l f55cabf3-64b8-4eb1-a6cc-c3d7915dde9c Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 44027a08-3f84-4a27-a90a-8803180ded45 Dec 12 13:23:09 np0005557561.novalocal sudo[92539]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:09 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:09 np0005557561.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Dec 12 13:23:09 np0005557561.novalocal sudo[92554]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:23:09 np0005557561.novalocal systemd[1]: Started Session c41 of User root. Dec 12 13:23:09 np0005557561.novalocal sudo[92554]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:09 np0005557561.novalocal sudo[92550]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:09 np0005557561.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Dec 12 13:23:09 np0005557561.novalocal sudo[92558]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 crqyxMhf2JRh439FCSrW 72MVKGcGXvgCkT6t False -p3260 -a::1 Dec 12 13:23:09 np0005557561.novalocal systemd[1]: Started Session c42 of User root. Dec 12 13:23:09 np0005557561.novalocal sudo[92558]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:10 np0005557561.novalocal sudo[92554]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:10 np0005557561.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Dec 12 13:23:10 np0005557561.novalocal sudo[92562]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:23:10 np0005557561.novalocal systemd[1]: Started Session c43 of User root. Dec 12 13:23:10 np0005557561.novalocal sudo[92562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:10 np0005557561.novalocal sudo[92562]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:10 np0005557561.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Dec 12 13:23:10 np0005557561.novalocal sudo[92558]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:10 np0005557561.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Dec 12 13:23:10 np0005557561.novalocal sudo[92581]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:23:10 np0005557561.novalocal systemd[1]: Started Session c44 of User root. Dec 12 13:23:10 np0005557561.novalocal sudo[92581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:11 np0005557561.novalocal sudo[92581]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:11 np0005557561.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Dec 12 13:23:11 np0005557561.novalocal sudo[92586]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:11 np0005557561.novalocal systemd[1]: Started Session c45 of User root. Dec 12 13:23:11 np0005557561.novalocal sudo[92586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:11 np0005557561.novalocal sudo[92586]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:11 np0005557561.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Dec 12 13:23:11 np0005557561.novalocal sudo[92591]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 crqyxMhf2JRh439FCSrW 72MVKGcGXvgCkT6t iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:23:11 np0005557561.novalocal systemd[1]: Started Session c46 of User root. Dec 12 13:23:11 np0005557561.novalocal sudo[92591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:12 np0005557561.novalocal sudo[92591]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:12 np0005557561.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Dec 12 13:23:12 np0005557561.novalocal sudo[92596]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:12 np0005557561.novalocal systemd[1]: Started Session c47 of User root. Dec 12 13:23:12 np0005557561.novalocal sudo[92596]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:12 np0005557561.novalocal sudo[92596]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:12 np0005557561.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:23:13 np0005557561.novalocal kernel: iscsi: registered transport (tcp) Dec 12 13:23:13 np0005557561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 12 13:23:13 np0005557561.novalocal iscsid[74102]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405c977275e99f04b33af6197d4b port group 0 rel port 1 Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:23:13 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:23:13 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 12 13:23:13 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:13 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l efccea7a-583b-4f2d-b326-7afae60dc702 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e6ab0565-a257-4a42-8e77-5a145476a283 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b4637a92-f8ce-40cd-93be-a93a9b6dcaf5 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b8b91c37-e76a-46c9-9b3b-a56977b8f53b Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1d3da66b-578f-4aca-8654-78e16a81aba3 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7ae46a59-933d-4570-a662-4c950e5220f5 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 72229b25-770d-4706-9f0e-e1dd58e07d88 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 52f5302d-6ef2-4038-a9de-d008a3e6edbf Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l 83a87872-5ef2-4634-bd7d-69878806f228 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l efccea7a-583b-4f2d-b326-7afae60dc702 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e6ab0565-a257-4a42-8e77-5a145476a283 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b8b91c37-e76a-46c9-9b3b-a56977b8f53b Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b4637a92-f8ce-40cd-93be-a93a9b6dcaf5 Dec 12 13:23:13 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:14 np0005557561.novalocal sudo[92651]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 12 13:23:14 np0005557561.novalocal systemd[1]: Started Session c48 of User root. Dec 12 13:23:14 np0005557561.novalocal sudo[92651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 3172e4ef-f889-4792-8f67-6af3ca5fdc7f Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l e137f506-a235-4167-ad1d-6e6896fed26d Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: failed to retrieve rpm info for path '/dev/sda': Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 14e0bf2a-36a8-4832-828c-f9ca5bdf03cf Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 77891096-166a-4010-b97f-7884b716f303 Dec 12 13:23:14 np0005557561.novalocal sudo[92651]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:14 np0005557561.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 3192d326-dd65-4403-bc12-948e204f6e7f Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l c6e79fcb-8579-4a93-a387-62fec54880f5 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84c10163-83b7-4384-b975-229842a58bf2 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e2ccf59-6a7b-4568-a8fa-7a34a211cf79 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l ccf78712-aa91-4258-83b9-93a95ccfd467 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 77891096-166a-4010-b97f-7884b716f303 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 5b295cc9-1792-4139-8d13-9e1569b14f66 Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l c01f6f54-377d-44c7-88f3-2f11da04149b Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:23:14 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:15 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:15 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:23:15 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:15 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:23:15 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:23:15 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:23:15 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:23:15 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:23:15 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:23:15 np0005557561.novalocal sudo[92663]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 12 13:23:15 np0005557561.novalocal systemd[1]: Started Session c49 of User root. Dec 12 13:23:15 np0005557561.novalocal sudo[92663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 14e0bf2a-36a8-4832-828c-f9ca5bdf03cf Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:16 np0005557561.novalocal sudo[92663]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:16 np0005557561.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 5b295cc9-1792-4139-8d13-9e1569b14f66 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:23:16 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:16 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 12 13:23:16 np0005557561.novalocal iscsid[74102]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:16 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. For complete SELinux messages run: sealert -l 1d3da66b-578f-4aca-8654-78e16a81aba3 Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l f5d5cdbc-f9bb-40ef-b3f7-c3304e8e4c4e Dec 12 13:23:17 np0005557561.novalocal sudo[92709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:17 np0005557561.novalocal systemd[1]: Started Session c50 of User root. Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 540e61fc-5554-43ec-b173-135c94ec20a2 Dec 12 13:23:17 np0005557561.novalocal sudo[92709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. For complete SELinux messages run: sealert -l 327f2e14-33a5-4557-b7a7-200df3637fbf Dec 12 13:23:17 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:17 np0005557561.novalocal sudo[92709]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:17 np0005557561.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Dec 12 13:23:17 np0005557561.novalocal sudo[92715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:17 np0005557561.novalocal systemd[1]: Started Session c51 of User root. Dec 12 13:23:17 np0005557561.novalocal sudo[92715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:18 np0005557561.novalocal sudo[92715]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:18 np0005557561.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Dec 12 13:23:18 np0005557561.novalocal sudo[92720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:23:18 np0005557561.novalocal systemd[1]: Started Session c52 of User root. Dec 12 13:23:18 np0005557561.novalocal sudo[92720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:18 np0005557561.novalocal sudo[92720]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:18 np0005557561.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Dec 12 13:23:18 np0005557561.novalocal sudo[92725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:23:18 np0005557561.novalocal systemd[1]: Started Session c53 of User root. Dec 12 13:23:18 np0005557561.novalocal sudo[92725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:19 np0005557561.novalocal sudo[92725]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:19 np0005557561.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Dec 12 13:23:19 np0005557561.novalocal sudo[92730]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:19 np0005557561.novalocal systemd[1]: Started Session c54 of User root. Dec 12 13:23:19 np0005557561.novalocal sudo[92730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:19 np0005557561.novalocal sudo[92730]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:19 np0005557561.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Dec 12 13:23:24 np0005557561.novalocal sudo[92745]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-701a6b79-30b0-4c6a-861d-c4bf910d432b cinder-volumes/cinder-volumes-pool Dec 12 13:23:24 np0005557561.novalocal systemd[1]: Started Session c55 of User root. Dec 12 13:23:24 np0005557561.novalocal sudo[92745]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:25 np0005557561.novalocal lvm[92757]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:23:25 np0005557561.novalocal lvm[92757]: VG cinder-volumes finished Dec 12 13:23:25 np0005557561.novalocal sudo[92745]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:25 np0005557561.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Dec 12 13:23:26 np0005557561.novalocal sudo[92759]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpzxz94h9_/privsep.sock Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 77891096-166a-4010-b97f-7884b716f303 Dec 12 13:23:26 np0005557561.novalocal systemd[1]: Started Session c56 of User root. Dec 12 13:23:26 np0005557561.novalocal sudo[92759]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 3192d326-dd65-4403-bc12-948e204f6e7f Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /etc/shadow. For complete SELinux messages run: sealert -l b7f35818-d47f-4476-ac84-c9669217866a Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84c10163-83b7-4384-b975-229842a58bf2 Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e2ccf59-6a7b-4568-a8fa-7a34a211cf79 Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l ccf78712-aa91-4258-83b9-93a95ccfd467 Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:26 np0005557561.novalocal sudo[92759]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e2ccf59-6a7b-4568-a8fa-7a34a211cf79 Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l ccf78712-aa91-4258-83b9-93a95ccfd467 Dec 12 13:23:26 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l a0e0443b-cba7-4662-8091-f88964dc3352 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal sudo[92780]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-701a6b79-30b0-4c6a-861d-c4bf910d432b Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 542d900c-6f31-46d1-9d20-9fd8b540c8b7 Dec 12 13:23:27 np0005557561.novalocal systemd[1]: Started Session c57 of User root. Dec 12 13:23:27 np0005557561.novalocal sudo[92780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 14e0bf2a-36a8-4832-828c-f9ca5bdf03cf Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 7cfb825b-27ca-4729-aa84-2acd58598845 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 4ecfdb2d-2091-4172-9cd1-5423e49ccd18 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l b1e98a94-473f-408d-9948-8b31aa827685 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 4dc743be-b1e6-4843-a7b0-806f9716fba2 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-VYgAsM. For complete SELinux messages run: sealert -l d52fb7ff-3e56-420a-b62b-7e89a533720a Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-VYgAsM. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-VYgAsM file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d44d313d-f12d-4a6f-ae9c-2f151e66e172 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 44027a08-3f84-4a27-a90a-8803180ded45 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l b67632a0-c43e-4d44-98e6-e347f2896f0d Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l f55cabf3-64b8-4eb1-a6cc-c3d7915dde9c Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 1b892598-56f4-45fd-abc8-faf44245d405 Dec 12 13:23:27 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:27 np0005557561.novalocal sudo[92780]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:27 np0005557561.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Dec 12 13:23:27 np0005557561.novalocal sudo[92785]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-701a6b79-30b0-4c6a-861d-c4bf910d432b iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b ipBrBTivP72D466dDRRU Bayt82ZCve9z3ico False -p3260 -a::1 Dec 12 13:23:27 np0005557561.novalocal systemd[1]: Started Session c58 of User root. Dec 12 13:23:27 np0005557561.novalocal sudo[92785]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:28 np0005557561.novalocal sudo[92785]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:28 np0005557561.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Dec 12 13:23:28 np0005557561.novalocal sudo[92791]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:23:28 np0005557561.novalocal systemd[1]: Started Session c59 of User root. Dec 12 13:23:28 np0005557561.novalocal sudo[92791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:28 np0005557561.novalocal sudo[92791]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:28 np0005557561.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Dec 12 13:23:28 np0005557561.novalocal sudo[92796]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:28 np0005557561.novalocal systemd[1]: Started Session c60 of User root. Dec 12 13:23:28 np0005557561.novalocal sudo[92796]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:29 np0005557561.novalocal sudo[92796]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:29 np0005557561.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Dec 12 13:23:29 np0005557561.novalocal sudo[92801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b ipBrBTivP72D466dDRRU Bayt82ZCve9z3ico iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:23:29 np0005557561.novalocal systemd[1]: Started Session c61 of User root. Dec 12 13:23:29 np0005557561.novalocal sudo[92801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:29 np0005557561.novalocal sudo[92801]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:29 np0005557561.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Dec 12 13:23:30 np0005557561.novalocal sudo[92806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:30 np0005557561.novalocal systemd[1]: Started Session c62 of User root. Dec 12 13:23:30 np0005557561.novalocal sudo[92806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:30 np0005557561.novalocal sudo[92806]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:30 np0005557561.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Dec 12 13:23:30 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:23:30 np0005557561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 12 13:23:30 np0005557561.novalocal iscsid[74102]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:23:30 np0005557561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:23:30 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:23:30 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405e3419d3b0d2b4ca7b0d3d75ea port group 0 rel port 1 Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:23:30 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:23:30 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:30 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 12 13:23:30 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:30 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l efccea7a-583b-4f2d-b326-7afae60dc702 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e6ab0565-a257-4a42-8e77-5a145476a283 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l b4637a92-f8ce-40cd-93be-a93a9b6dcaf5 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l b8b91c37-e76a-46c9-9b3b-a56977b8f53b Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1d3da66b-578f-4aca-8654-78e16a81aba3 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l e1c87ef5-516f-48a9-ad33-c58cc8166ce1 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 056121f2-ca29-4187-b7f6-8d72562cf987 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 52f5302d-6ef2-4038-a9de-d008a3e6edbf Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. For complete SELinux messages run: sealert -l 83a87872-5ef2-4634-bd7d-69878806f228 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:23:31 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:31 np0005557561.novalocal sudo[92862]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 12 13:23:32 np0005557561.novalocal systemd[1]: Started Session c63 of User root. Dec 12 13:23:32 np0005557561.novalocal sudo[92862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 3172e4ef-f889-4792-8f67-6af3ca5fdc7f Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l e137f506-a235-4167-ad1d-6e6896fed26d Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 14e0bf2a-36a8-4832-828c-f9ca5bdf03cf Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 77891096-166a-4010-b97f-7884b716f303 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 3192d326-dd65-4403-bc12-948e204f6e7f Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l c6e79fcb-8579-4a93-a387-62fec54880f5 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 84c10163-83b7-4384-b975-229842a58bf2 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 7e2ccf59-6a7b-4568-a8fa-7a34a211cf79 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l ccf78712-aa91-4258-83b9-93a95ccfd467 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:23:32 np0005557561.novalocal sudo[92862]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:32 np0005557561.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 5b295cc9-1792-4139-8d13-9e1569b14f66 Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l c01f6f54-377d-44c7-88f3-2f11da04149b Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:23:32 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:33 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:23:33 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:23:33 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:33 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:23:33 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:23:33 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:23:33 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:23:33 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:23:33 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:23:33 np0005557561.novalocal sudo[92870]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 12 13:23:33 np0005557561.novalocal systemd[1]: Started Session c64 of User root. Dec 12 13:23:33 np0005557561.novalocal sudo[92870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:23:33 np0005557561.novalocal sudo[92870]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:33 np0005557561.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Dec 12 13:23:33 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:23:33 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:33 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:23:34 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 12 13:23:34 np0005557561.novalocal iscsid[74102]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l f5d5cdbc-f9bb-40ef-b3f7-c3304e8e4c4e Dec 12 13:23:34 np0005557561.novalocal sudo[92911]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal systemd[1]: Started Session c65 of User root. Dec 12 13:23:34 np0005557561.novalocal sudo[92911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 540e61fc-5554-43ec-b173-135c94ec20a2 Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b. For complete SELinux messages run: sealert -l 327f2e14-33a5-4557-b7a7-200df3637fbf Dec 12 13:23:34 np0005557561.novalocal setroubleshoot[92420]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:23:34 np0005557561.novalocal sudo[92911]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:34 np0005557561.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Dec 12 13:23:34 np0005557561.novalocal sudo[92917]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:35 np0005557561.novalocal systemd[1]: Started Session c66 of User root. Dec 12 13:23:35 np0005557561.novalocal sudo[92917]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:35 np0005557561.novalocal sudo[92917]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:35 np0005557561.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Dec 12 13:23:35 np0005557561.novalocal sudo[92922]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:23:35 np0005557561.novalocal systemd[1]: Started Session c67 of User root. Dec 12 13:23:35 np0005557561.novalocal sudo[92922]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:36 np0005557561.novalocal sudo[92922]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:36 np0005557561.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Dec 12 13:23:36 np0005557561.novalocal sudo[92928]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-701a6b79-30b0-4c6a-861d-c4bf910d432b Dec 12 13:23:36 np0005557561.novalocal systemd[1]: Started Session c68 of User root. Dec 12 13:23:36 np0005557561.novalocal sudo[92928]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:36 np0005557561.novalocal sudo[92928]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:36 np0005557561.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Dec 12 13:23:36 np0005557561.novalocal sudo[92933]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:23:36 np0005557561.novalocal systemd[1]: Started Session c69 of User root. Dec 12 13:23:36 np0005557561.novalocal sudo[92933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:23:37 np0005557561.novalocal sudo[92933]: pam_unix(sudo:session): session closed for user root Dec 12 13:23:37 np0005557561.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Dec 12 13:23:44 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Dec 12 13:23:44 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.312s CPU time. Dec 12 13:23:44 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:23:44 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 6.912s CPU time. Dec 12 13:24:02 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:24:02 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:24:02 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:24:02 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:24:03 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:24:03 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 98a14808-3e37-4ea8-ad5e-1248549987e4 Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 0b0add3b-8ee4-45df-9712-d03c59f59631 Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l a69d2466-3722-4bdb-98ee-3586ee589217 Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3': Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l ef744d0b-b7f0-4923-accf-f4883e57a950 Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 4e040bb1-43ea-49c0-a45f-60e1d064391b Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l e0af05ae-0f50-4ee5-a8e1-0055161f2cad Dec 12 13:24:04 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l fbd31978-8455-41c0-9261-f6e85fc53d5f Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 85d9dff9-5a4c-433e-a851-cdc0fa3fb14a Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 4e040bb1-43ea-49c0-a45f-60e1d064391b Dec 12 13:24:07 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:08 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l e0af05ae-0f50-4ee5-a8e1-0055161f2cad Dec 12 13:24:08 np0005557561.novalocal setroubleshoot[93021]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:24:08 np0005557561.novalocal sudo[93056]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:24:08 np0005557561.novalocal systemd[1]: Started Session c70 of User root. Dec 12 13:24:08 np0005557561.novalocal sudo[93056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:24:09 np0005557561.novalocal sudo[93056]: pam_unix(sudo:session): session closed for user root Dec 12 13:24:09 np0005557561.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Dec 12 13:24:09 np0005557561.novalocal sudo[93060]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:24:09 np0005557561.novalocal systemd[1]: Started Session c71 of User root. Dec 12 13:24:09 np0005557561.novalocal sudo[93060]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:24:09 np0005557561.novalocal sudo[93060]: pam_unix(sudo:session): session closed for user root Dec 12 13:24:09 np0005557561.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Dec 12 13:24:09 np0005557561.novalocal sudo[93072]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:24:09 np0005557561.novalocal systemd[1]: Started Session c72 of User root. Dec 12 13:24:09 np0005557561.novalocal sudo[93072]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:24:10 np0005557561.novalocal sudo[93072]: pam_unix(sudo:session): session closed for user root Dec 12 13:24:10 np0005557561.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Dec 12 13:24:10 np0005557561.novalocal sudo[93076]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:24:10 np0005557561.novalocal systemd[1]: Started Session c73 of User root. Dec 12 13:24:10 np0005557561.novalocal sudo[93076]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:24:10 np0005557561.novalocal sudo[93076]: pam_unix(sudo:session): session closed for user root Dec 12 13:24:10 np0005557561.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Dec 12 13:24:18 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Dec 12 13:24:18 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.167s CPU time. Dec 12 13:24:18 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:24:18 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.496s CPU time. Dec 12 13:25:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:25:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:25:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:25:08 np0005557561.novalocal sudo[93229]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:25:08 np0005557561.novalocal systemd[1]: Started Session c74 of User root. Dec 12 13:25:08 np0005557561.novalocal sudo[93229]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:25:09 np0005557561.novalocal sudo[93229]: pam_unix(sudo:session): session closed for user root Dec 12 13:25:09 np0005557561.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Dec 12 13:25:09 np0005557561.novalocal sudo[93233]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:25:09 np0005557561.novalocal systemd[1]: Started Session c75 of User root. Dec 12 13:25:09 np0005557561.novalocal sudo[93233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:25:09 np0005557561.novalocal sudo[93233]: pam_unix(sudo:session): session closed for user root Dec 12 13:25:09 np0005557561.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Dec 12 13:25:09 np0005557561.novalocal sudo[93238]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:25:09 np0005557561.novalocal systemd[1]: Started Session c76 of User root. Dec 12 13:25:09 np0005557561.novalocal sudo[93238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:25:10 np0005557561.novalocal sudo[93238]: pam_unix(sudo:session): session closed for user root Dec 12 13:25:10 np0005557561.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Dec 12 13:25:10 np0005557561.novalocal sudo[93243]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:25:10 np0005557561.novalocal systemd[1]: Started Session c77 of User root. Dec 12 13:25:10 np0005557561.novalocal sudo[93243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:25:10 np0005557561.novalocal sudo[93243]: pam_unix(sudo:session): session closed for user root Dec 12 13:25:10 np0005557561.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Dec 12 13:25:22 np0005557561.novalocal systemd[88664]: Created slice User Background Tasks Slice. Dec 12 13:25:22 np0005557561.novalocal systemd[88664]: Starting Cleanup of User's Temporary Files and Directories... Dec 12 13:25:22 np0005557561.novalocal systemd[88664]: Finished Cleanup of User's Temporary Files and Directories. Dec 12 13:26:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:26:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:26:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:26:00 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:00 np0005557561.novalocal systemd-sysv-generator[93414]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:00 np0005557561.novalocal systemd-rc-local-generator[93409]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:01 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:01 np0005557561.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Dec 12 13:26:03 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:26:04 np0005557561.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Dec 12 13:26:04 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:26:04 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:04 np0005557561.novalocal systemd-rc-local-generator[93454]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:04 np0005557561.novalocal systemd-sysv-generator[93459]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:04 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:05 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:05 np0005557561.novalocal systemd-sysv-generator[93489]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:05 np0005557561.novalocal systemd-rc-local-generator[93486]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:05 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:05 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Dec 12 13:26:05 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:05 np0005557561.novalocal systemd-rc-local-generator[93523]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:05 np0005557561.novalocal systemd-sysv-generator[93530]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:05 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:06 np0005557561.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 36e9fb14-221d-4c04-9c74-26332fbc3153 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l dab61061-32ce-45e8-870b-b6cc2013f9bc Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 13185d8b-a99e-48f9-a563-5982f3741350 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 05138813-57ea-4ec9-a714-47480df6808c Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l c6a4d957-9f3e-4b9d-9dd3-dc2b6590c786 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l a742681c-c28e-442f-b8c1-d94322425cc2 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l ea98823a-5122-4ae4-8f6f-b6898bd03583 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 4003b693-81ab-4406-9e11-389743c59ab8 Dec 12 13:26:06 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1f89e3c0-d238-4392-ab75-ed90ef8d3bc9 Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l f8636bbb-1197-471e-8f6e-c621eacfe0a8 Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 0b42353f-2f4a-4e7b-b385-ed89328a119d Dec 12 13:26:07 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:08 np0005557561.novalocal sudo[93555]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:26:08 np0005557561.novalocal systemd[1]: Started Session c78 of User root. Dec 12 13:26:08 np0005557561.novalocal sudo[93555]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:26:09 np0005557561.novalocal sudo[93555]: pam_unix(sudo:session): session closed for user root Dec 12 13:26:09 np0005557561.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Dec 12 13:26:09 np0005557561.novalocal sudo[93559]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:26:09 np0005557561.novalocal systemd[1]: Started Session c79 of User root. Dec 12 13:26:09 np0005557561.novalocal sudo[93559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:26:09 np0005557561.novalocal sudo[93559]: pam_unix(sudo:session): session closed for user root Dec 12 13:26:09 np0005557561.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Dec 12 13:26:09 np0005557561.novalocal sudo[93566]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:26:09 np0005557561.novalocal systemd[1]: Started Session c80 of User root. Dec 12 13:26:09 np0005557561.novalocal sudo[93566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:26:10 np0005557561.novalocal sudo[93566]: pam_unix(sudo:session): session closed for user root Dec 12 13:26:10 np0005557561.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Dec 12 13:26:10 np0005557561.novalocal sudo[93571]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:26:10 np0005557561.novalocal systemd[1]: Started Session c81 of User root. Dec 12 13:26:10 np0005557561.novalocal sudo[93571]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:26:10 np0005557561.novalocal sudo[93571]: pam_unix(sudo:session): session closed for user root Dec 12 13:26:10 np0005557561.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Dec 12 13:26:11 np0005557561.novalocal systemd[1]: Started OpenStack Nova Compute Server. Dec 12 13:26:12 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:12 np0005557561.novalocal systemd-rc-local-generator[93601]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:12 np0005557561.novalocal systemd-sysv-generator[93604]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:12 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:12 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:12 np0005557561.novalocal systemd-rc-local-generator[93649]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:12 np0005557561.novalocal systemd-sysv-generator[93654]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:12 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:12 np0005557561.novalocal systemd[1]: Starting libvirt QEMU daemon... Dec 12 13:26:12 np0005557561.novalocal systemd[1]: Started libvirt QEMU daemon. Dec 12 13:26:12 np0005557561.novalocal nova-compute[93537]: libvirt: error : internal error: could not initialize domain event timer Dec 12 13:26:13 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:13 np0005557561.novalocal systemd-rc-local-generator[93717]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:13 np0005557561.novalocal systemd-sysv-generator[93720]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:13 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:13 np0005557561.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Dec 12 13:26:14 np0005557561.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Dec 12 13:26:14 np0005557561.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Dec 12 13:26:14 np0005557561.novalocal systemd[1]: Starting libvirt nodedev daemon... Dec 12 13:26:14 np0005557561.novalocal systemd[1]: Started libvirt nodedev daemon. Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 36e9fb14-221d-4c04-9c74-26332fbc3153 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l dab61061-32ce-45e8-870b-b6cc2013f9bc Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 13185d8b-a99e-48f9-a563-5982f3741350 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 05138813-57ea-4ec9-a714-47480df6808c Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l c6a4d957-9f3e-4b9d-9dd3-dc2b6590c786 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l a742681c-c28e-442f-b8c1-d94322425cc2 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l ea98823a-5122-4ae4-8f6f-b6898bd03583 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 4003b693-81ab-4406-9e11-389743c59ab8 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1f89e3c0-d238-4392-ab75-ed90ef8d3bc9 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l f8636bbb-1197-471e-8f6e-c621eacfe0a8 Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 0b42353f-2f4a-4e7b-b385-ed89328a119d Dec 12 13:26:15 np0005557561.novalocal setroubleshoot[93424]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Dec 12 13:26:15 np0005557561.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Dec 12 13:26:15 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:15 np0005557561.novalocal systemd-sysv-generator[93792]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:15 np0005557561.novalocal systemd-rc-local-generator[93788]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:16 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:16 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:26:16 np0005557561.novalocal systemd-rc-local-generator[93821]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:26:16 np0005557561.novalocal systemd-sysv-generator[93827]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:26:16 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:26:25 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Dec 12 13:26:25 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.283s CPU time. Dec 12 13:26:25 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:26:25 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 2.231s CPU time. Dec 12 13:26:51 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:26:51 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:26:52 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l d3fadb59-e120-4b19-bf14-626f7380272d Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 1f86d935-a5e4-4df3-a69d-d63d7a8c5a7d Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 2955fc2c-8f3f-4397-a20d-515c90f98fb3 Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3': Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 72da25ab-c88f-4db5-ba4f-b22ea8bc2175 Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 59cd7e2b-a803-4900-966c-8cc0d02c740e Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 6511bb58-f511-44b2-99fe-d86158f2f22d Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l a08cfdeb-0c20-4de3-b9d5-0765cf28b1fb Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e38e3a12-01fd-4ab9-bb78-28d7ac706cc8 Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 84ee98e9-4031-42a2-86a9-79575d6b3df7 Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 6349cf8b-345d-47b3-9927-a16b43de8c3f Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 297dddf0-71d7-4479-837f-6867bbf903a6 Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 59cd7e2b-a803-4900-966c-8cc0d02c740e Dec 12 13:26:53 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:26:54 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 6511bb58-f511-44b2-99fe-d86158f2f22d Dec 12 13:26:54 np0005557561.novalocal setroubleshoot[93896]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:27:01 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:27:01 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:27:01 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:27:02 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:27:02 np0005557561.novalocal systemd-sysv-generator[93967]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:27:02 np0005557561.novalocal systemd-rc-local-generator[93962]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:27:02 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:27:02 np0005557561.novalocal systemd[1]: Started OpenStack Octavia Worker service. Dec 12 13:27:02 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:27:03 np0005557561.novalocal systemd-rc-local-generator[93999]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:27:03 np0005557561.novalocal systemd-sysv-generator[94002]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:27:03 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:27:03 np0005557561.novalocal systemd[1]: Reloading. Dec 12 13:27:03 np0005557561.novalocal systemd-rc-local-generator[94028]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 12 13:27:03 np0005557561.novalocal systemd-sysv-generator[94031]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 12 13:27:03 np0005557561.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Dec 12 13:27:04 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Dec 12 13:27:04 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.183s CPU time. Dec 12 13:27:04 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:27:04 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.665s CPU time. Dec 12 13:27:08 np0005557561.novalocal sudo[94058]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:27:08 np0005557561.novalocal systemd[1]: Started Session c82 of User root. Dec 12 13:27:08 np0005557561.novalocal sudo[94058]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:27:09 np0005557561.novalocal sudo[94058]: pam_unix(sudo:session): session closed for user root Dec 12 13:27:09 np0005557561.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Dec 12 13:27:09 np0005557561.novalocal sudo[94062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:27:09 np0005557561.novalocal systemd[1]: Started Session c83 of User root. Dec 12 13:27:09 np0005557561.novalocal sudo[94062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:27:09 np0005557561.novalocal sudo[94062]: pam_unix(sudo:session): session closed for user root Dec 12 13:27:09 np0005557561.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Dec 12 13:27:09 np0005557561.novalocal sudo[94067]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:27:09 np0005557561.novalocal systemd[1]: Started Session c84 of User root. Dec 12 13:27:09 np0005557561.novalocal sudo[94067]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:27:10 np0005557561.novalocal sudo[94067]: pam_unix(sudo:session): session closed for user root Dec 12 13:27:10 np0005557561.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Dec 12 13:27:10 np0005557561.novalocal sudo[94071]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:27:10 np0005557561.novalocal systemd[1]: Started Session c85 of User root. Dec 12 13:27:10 np0005557561.novalocal sudo[94071]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:27:10 np0005557561.novalocal sudo[94071]: pam_unix(sudo:session): session closed for user root Dec 12 13:27:10 np0005557561.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Dec 12 13:27:17 np0005557561.novalocal runuser[94228]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:27:18 np0005557561.novalocal runuser[94228]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:27:18 np0005557561.novalocal runuser[94281]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:27:19 np0005557561.novalocal runuser[94281]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:27:19 np0005557561.novalocal runuser[94335]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:27:19 np0005557561.novalocal runuser[94335]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:27:43 np0005557561.novalocal sudo[94756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Dec 12 13:27:43 np0005557561.novalocal sudo[94756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:27:43 np0005557561.novalocal sudo[94756]: pam_unix(sudo:session): session closed for user root Dec 12 13:27:43 np0005557561.novalocal sudo[94760]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Dec 12 13:27:43 np0005557561.novalocal sudo[94760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:27:43 np0005557561.novalocal sudo[94760]: pam_unix(sudo:session): session closed for user root Dec 12 13:28:02 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:28:02 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:28:02 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:28:04 np0005557561.novalocal crontab[94823]: (root) LIST (root) Dec 12 13:28:04 np0005557561.novalocal crontab[94824]: (root) LIST (keystone) Dec 12 13:28:04 np0005557561.novalocal crontab[94825]: (root) LIST (cinder) Dec 12 13:28:04 np0005557561.novalocal crontab[94827]: (root) LIST (glance) Dec 12 13:28:04 np0005557561.novalocal crontab[94828]: (root) LIST (nova) Dec 12 13:28:04 np0005557561.novalocal crontab[94829]: (root) LIST (manila) Dec 12 13:28:07 np0005557561.novalocal runuser[94837]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:08 np0005557561.novalocal runuser[94837]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:08 np0005557561.novalocal runuser[94891]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:08 np0005557561.novalocal sudo[94936]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:28:08 np0005557561.novalocal systemd[1]: Started Session c86 of User root. Dec 12 13:28:08 np0005557561.novalocal sudo[94936]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:28:09 np0005557561.novalocal runuser[94891]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:09 np0005557561.novalocal sudo[94936]: pam_unix(sudo:session): session closed for user root Dec 12 13:28:09 np0005557561.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Dec 12 13:28:09 np0005557561.novalocal runuser[94947]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:09 np0005557561.novalocal sudo[94955]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:28:09 np0005557561.novalocal systemd[1]: Started Session c87 of User root. Dec 12 13:28:09 np0005557561.novalocal sudo[94955]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:28:09 np0005557561.novalocal sudo[94955]: pam_unix(sudo:session): session closed for user root Dec 12 13:28:09 np0005557561.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Dec 12 13:28:09 np0005557561.novalocal sudo[94997]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:28:09 np0005557561.novalocal systemd[1]: Started Session c88 of User root. Dec 12 13:28:09 np0005557561.novalocal sudo[94997]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:28:10 np0005557561.novalocal sudo[94997]: pam_unix(sudo:session): session closed for user root Dec 12 13:28:10 np0005557561.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Dec 12 13:28:10 np0005557561.novalocal runuser[94947]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:10 np0005557561.novalocal sudo[95010]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:28:10 np0005557561.novalocal systemd[1]: Started Session c89 of User root. Dec 12 13:28:10 np0005557561.novalocal sudo[95010]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:28:10 np0005557561.novalocal runuser[95012]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:10 np0005557561.novalocal sudo[95010]: pam_unix(sudo:session): session closed for user root Dec 12 13:28:10 np0005557561.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Dec 12 13:28:11 np0005557561.novalocal runuser[95012]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:11 np0005557561.novalocal runuser[95068]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:11 np0005557561.novalocal runuser[95068]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:11 np0005557561.novalocal runuser[95120]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:12 np0005557561.novalocal runuser[95120]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:12 np0005557561.novalocal runuser[95172]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:13 np0005557561.novalocal runuser[95172]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:13 np0005557561.novalocal runuser[95226]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:14 np0005557561.novalocal runuser[95226]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:14 np0005557561.novalocal runuser[95279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:14 np0005557561.novalocal runuser[95279]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:15 np0005557561.novalocal runuser[95334]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:15 np0005557561.novalocal runuser[95334]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:16 np0005557561.novalocal runuser[95397]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:17 np0005557561.novalocal runuser[95397]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:17 np0005557561.novalocal runuser[95450]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:18 np0005557561.novalocal runuser[95450]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:18 np0005557561.novalocal runuser[95504]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:19 np0005557561.novalocal runuser[95504]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:19 np0005557561.novalocal runuser[95557]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:20 np0005557561.novalocal runuser[95557]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:21 np0005557561.novalocal runuser[95623]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:22 np0005557561.novalocal runuser[95623]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:22 np0005557561.novalocal runuser[95675]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:22 np0005557561.novalocal runuser[95675]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:24 np0005557561.novalocal virtqemud[93658]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Dec 12 13:28:24 np0005557561.novalocal virtqemud[93658]: hostname: np0005557561.novalocal Dec 12 13:28:24 np0005557561.novalocal virtqemud[93658]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 12 13:28:24 np0005557561.novalocal virtqemud[93658]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 12 13:28:25 np0005557561.novalocal runuser[95759]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:26 np0005557561.novalocal runuser[95759]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:26 np0005557561.novalocal runuser[95811]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:26 np0005557561.novalocal runuser[95811]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:27 np0005557561.novalocal runuser[95871]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:28 np0005557561.novalocal runuser[95871]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:28 np0005557561.novalocal runuser[95923]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Dec 12 13:28:29 np0005557561.novalocal runuser[95923]: pam_unix(runuser:session): session closed for user rabbitmq Dec 12 13:28:42 np0005557561.novalocal sshd-session[96051]: Connection closed by 167.71.2.158 port 48854 Dec 12 13:29:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:29:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:29:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:29:08 np0005557561.novalocal sudo[96101]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:29:08 np0005557561.novalocal systemd[1]: Started Session c90 of User root. Dec 12 13:29:08 np0005557561.novalocal sudo[96101]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:29:09 np0005557561.novalocal sudo[96101]: pam_unix(sudo:session): session closed for user root Dec 12 13:29:09 np0005557561.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Dec 12 13:29:09 np0005557561.novalocal sudo[96105]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:29:09 np0005557561.novalocal systemd[1]: Started Session c91 of User root. Dec 12 13:29:09 np0005557561.novalocal sudo[96105]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:29:09 np0005557561.novalocal sudo[96105]: pam_unix(sudo:session): session closed for user root Dec 12 13:29:09 np0005557561.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Dec 12 13:29:09 np0005557561.novalocal sudo[96110]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:29:09 np0005557561.novalocal systemd[1]: Started Session c92 of User root. Dec 12 13:29:09 np0005557561.novalocal sudo[96110]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:29:10 np0005557561.novalocal sudo[96110]: pam_unix(sudo:session): session closed for user root Dec 12 13:29:10 np0005557561.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Dec 12 13:29:10 np0005557561.novalocal sudo[96115]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:29:10 np0005557561.novalocal systemd[1]: Started Session c93 of User root. Dec 12 13:29:10 np0005557561.novalocal sudo[96115]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:29:10 np0005557561.novalocal sudo[96115]: pam_unix(sudo:session): session closed for user root Dec 12 13:29:10 np0005557561.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:30:01 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Created slice User Slice of UID 163. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Created slice User Slice of UID 161. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Starting User Manager for UID 163... Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Starting User Manager for UID 161... Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Queued start job for default target Main User Target. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Created slice User Application Slice. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Started Daily Cleanup of User's Temporary Directories. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Reached target Paths. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Reached target Timers. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Starting D-Bus User Message Bus Socket... Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Listening on PipeWire PulseAudio. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Listening on PipeWire Multimedia System Sockets. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Queued start job for default target Main User Target. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Created slice User Application Slice. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Starting Create User's Volatile Files and Directories... Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Started Daily Cleanup of User's Temporary Directories. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Reached target Paths. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Reached target Timers. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Starting D-Bus User Message Bus Socket... Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Listening on PipeWire PulseAudio. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Listening on PipeWire Multimedia System Sockets. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Starting Create User's Volatile Files and Directories... Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Listening on D-Bus User Message Bus Socket. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Reached target Sockets. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Finished Create User's Volatile Files and Directories. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Reached target Basic System. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Reached target Main User Target. Dec 12 13:30:01 np0005557561.novalocal systemd[96276]: Startup finished in 185ms. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Started User Manager for UID 161. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Listening on D-Bus User Message Bus Socket. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Reached target Sockets. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Finished Create User's Volatile Files and Directories. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Reached target Basic System. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Reached target Main User Target. Dec 12 13:30:01 np0005557561.novalocal systemd[96275]: Startup finished in 200ms. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Started Session 6 of User glance. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Started User Manager for UID 163. Dec 12 13:30:01 np0005557561.novalocal systemd[1]: Started Session 5 of User keystone. Dec 12 13:30:01 np0005557561.novalocal CROND[96295]: (glance) CMD (glance-cache-pruner) Dec 12 13:30:01 np0005557561.novalocal CROND[96296]: (keystone) CMD (keystone-manage fernet_rotate) Dec 12 13:30:02 np0005557561.novalocal CROND[96267]: (glance) CMDOUT (2025-12-12 13:30:02.391 96295 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Dec 12 13:30:02 np0005557561.novalocal CROND[96267]: (glance) CMDOUT (2025-12-12 13:30:02.639 96295 DEBUG glance.image_cache [None req-2e7cd3ac-0f44-48a5-8a8d-6633168fba52 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Dec 12 13:30:02 np0005557561.novalocal CROND[96267]: (glance) CMDEND (glance-cache-pruner) Dec 12 13:30:02 np0005557561.novalocal systemd[1]: session-6.scope: Deactivated successfully. Dec 12 13:30:02 np0005557561.novalocal systemd[1]: session-6.scope: Consumed 1.028s CPU time. Dec 12 13:30:03 np0005557561.novalocal CROND[96268]: (keystone) CMDEND (keystone-manage fernet_rotate) Dec 12 13:30:03 np0005557561.novalocal systemd[1]: session-5.scope: Deactivated successfully. Dec 12 13:30:03 np0005557561.novalocal systemd[1]: session-5.scope: Consumed 1.807s CPU time. Dec 12 13:30:08 np0005557561.novalocal sudo[96310]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:30:08 np0005557561.novalocal systemd[1]: Started Session c94 of User root. Dec 12 13:30:08 np0005557561.novalocal sudo[96310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:09 np0005557561.novalocal sudo[96310]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:09 np0005557561.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Dec 12 13:30:09 np0005557561.novalocal sudo[96314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:30:09 np0005557561.novalocal systemd[1]: Started Session c95 of User root. Dec 12 13:30:09 np0005557561.novalocal sudo[96314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:09 np0005557561.novalocal sudo[96314]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:09 np0005557561.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Dec 12 13:30:09 np0005557561.novalocal sudo[96320]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:30:09 np0005557561.novalocal systemd[1]: Started Session c96 of User root. Dec 12 13:30:09 np0005557561.novalocal sudo[96320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:09 np0005557561.novalocal sudo[96320]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:09 np0005557561.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Dec 12 13:30:10 np0005557561.novalocal sudo[96338]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:30:10 np0005557561.novalocal systemd[1]: Started Session c97 of User root. Dec 12 13:30:10 np0005557561.novalocal sudo[96338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:10 np0005557561.novalocal sudo[96338]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:10 np0005557561.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopping User Manager for UID 161... Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Activating special unit Exit the Session... Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped target Main User Target. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped target Basic System. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped target Paths. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped target Sockets. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped target Timers. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped Daily Cleanup of User's Temporary Directories. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Closed D-Bus User Message Bus Socket. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Closed PipeWire PulseAudio. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Closed PipeWire Multimedia System Sockets. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Stopped Create User's Volatile Files and Directories. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Removed slice User Application Slice. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Reached target Shutdown. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Finished Exit the Session. Dec 12 13:30:13 np0005557561.novalocal systemd[96276]: Reached target Exit the Session. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user@161.service: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopped User Manager for UID 161. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Dec 12 13:30:13 np0005557561.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Removed slice User Slice of UID 161. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user-161.slice: Consumed 1.300s CPU time. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopping User Manager for UID 163... Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Activating special unit Exit the Session... Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped target Main User Target. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped target Basic System. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped target Paths. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped target Sockets. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped target Timers. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped Daily Cleanup of User's Temporary Directories. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Closed D-Bus User Message Bus Socket. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Closed PipeWire PulseAudio. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Closed PipeWire Multimedia System Sockets. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Stopped Create User's Volatile Files and Directories. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Removed slice User Application Slice. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Reached target Shutdown. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Finished Exit the Session. Dec 12 13:30:13 np0005557561.novalocal systemd[96275]: Reached target Exit the Session. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user@163.service: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopped User Manager for UID 163. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Dec 12 13:30:13 np0005557561.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: Removed slice User Slice of UID 163. Dec 12 13:30:13 np0005557561.novalocal systemd[1]: user-163.slice: Consumed 2.105s CPU time. Dec 12 13:30:25 np0005557561.novalocal sudo[96389]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpkbimmiit/privsep.sock Dec 12 13:30:25 np0005557561.novalocal systemd[1]: Started Session c98 of User root. Dec 12 13:30:25 np0005557561.novalocal sudo[96389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:30:26 np0005557561.novalocal sudo[96389]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:34 np0005557561.novalocal sudo[96413]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:30:34 np0005557561.novalocal systemd[1]: Started Session c99 of User root. Dec 12 13:30:34 np0005557561.novalocal sudo[96413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:35 np0005557561.novalocal sudo[96413]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:35 np0005557561.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Dec 12 13:30:35 np0005557561.novalocal sudo[96418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 --snapshot cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:30:35 np0005557561.novalocal systemd[1]: Started Session c100 of User root. Dec 12 13:30:35 np0005557561.novalocal sudo[96418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:35 np0005557561.novalocal dmeventd[88898]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 12 13:30:35 np0005557561.novalocal dmeventd[88898]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 12 13:30:35 np0005557561.novalocal lvm[96434]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:30:35 np0005557561.novalocal lvm[96434]: VG cinder-volumes finished Dec 12 13:30:35 np0005557561.novalocal sudo[96418]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:35 np0005557561.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Dec 12 13:30:35 np0005557561.novalocal sudo[96436]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:30:35 np0005557561.novalocal systemd[1]: Started Session c101 of User root. Dec 12 13:30:35 np0005557561.novalocal sudo[96436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:36 np0005557561.novalocal lvm[96441]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:30:36 np0005557561.novalocal lvm[96441]: VG cinder-volumes finished Dec 12 13:30:36 np0005557561.novalocal sudo[96436]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:36 np0005557561.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Dec 12 13:30:43 np0005557561.novalocal sudo[96503]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp6nj9e014/privsep.sock Dec 12 13:30:43 np0005557561.novalocal systemd[1]: Started Session c102 of User root. Dec 12 13:30:43 np0005557561.novalocal sudo[96503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 12 13:30:44 np0005557561.novalocal sudo[96503]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:44 np0005557561.novalocal sudo[96516]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:30:44 np0005557561.novalocal systemd[1]: Started Session c103 of User root. Dec 12 13:30:44 np0005557561.novalocal sudo[96516]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:45 np0005557561.novalocal sudo[96516]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:45 np0005557561.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Dec 12 13:30:45 np0005557561.novalocal sudo[96521]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 qKww77eXUXApcXNSBAGT HpeHZWjTLEfH5zeJ False -p3260 -a::1 Dec 12 13:30:45 np0005557561.novalocal systemd[1]: Started Session c104 of User root. Dec 12 13:30:45 np0005557561.novalocal sudo[96521]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:45 np0005557561.novalocal sudo[96521]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:45 np0005557561.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Dec 12 13:30:45 np0005557561.novalocal sudo[96529]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:30:45 np0005557561.novalocal systemd[1]: Started Session c105 of User root. Dec 12 13:30:45 np0005557561.novalocal sudo[96529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:46 np0005557561.novalocal sudo[96529]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:46 np0005557561.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Dec 12 13:30:46 np0005557561.novalocal sudo[96535]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:30:46 np0005557561.novalocal systemd[1]: Started Session c106 of User root. Dec 12 13:30:46 np0005557561.novalocal sudo[96535]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:46 np0005557561.novalocal sudo[96535]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:46 np0005557561.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Dec 12 13:30:46 np0005557561.novalocal sudo[96543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 qKww77eXUXApcXNSBAGT HpeHZWjTLEfH5zeJ iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:30:46 np0005557561.novalocal systemd[1]: Started Session c107 of User root. Dec 12 13:30:47 np0005557561.novalocal sudo[96543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:47 np0005557561.novalocal sudo[96543]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:47 np0005557561.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Dec 12 13:30:47 np0005557561.novalocal sudo[96548]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:30:47 np0005557561.novalocal systemd[1]: Started Session c108 of User root. Dec 12 13:30:47 np0005557561.novalocal sudo[96548]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:30:48 np0005557561.novalocal sudo[96548]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:48 np0005557561.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Dec 12 13:30:50 np0005557561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 12 13:30:50 np0005557561.novalocal iscsid[74102]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:30:50 np0005557561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:30:50 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:30:50 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014052c90e488f7a344b8badffefa6 port group 0 rel port 1 Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:30:50 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 12 13:30:50 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:30:50 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:30:50 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:30:50 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:30:50 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:30:50 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:30:50 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:30:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 12 13:30:51 np0005557561.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Dec 12 13:30:51 np0005557561.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Dec 12 13:30:51 np0005557561.novalocal systemd[1]: Starting libvirt secret daemon... Dec 12 13:30:51 np0005557561.novalocal systemd[1]: Started libvirt secret daemon. Dec 12 13:30:52 np0005557561.novalocal sudo[96620]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmp7hficpqu/privsep.sock Dec 12 13:30:52 np0005557561.novalocal systemd[1]: Started Session c109 of User root. Dec 12 13:30:52 np0005557561.novalocal sudo[96620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 12 13:30:53 np0005557561.novalocal sudo[96620]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:55 np0005557561.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Dec 12 13:30:55 np0005557561.novalocal kernel: tapdbd645e4-9a: entered promiscuous mode Dec 12 13:30:55 np0005557561.novalocal NetworkManager[858]: [1765564255.4442] manager: (tapdbd645e4-9a): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Dec 12 13:30:55 np0005557561.novalocal virtqemud[93658]: Domain id=1 name='instance-00000001' uuid=0f1909f4-3c07-4925-b98a-1424581acb23 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:30:55 np0005557561.novalocal virtqemud[93658]: Domain id=1 name='instance-00000001' uuid=0f1909f4-3c07-4925-b98a-1424581acb23 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:30:55 np0005557561.novalocal systemd-machined[90553]: New machine qemu-1-instance-00000001. Dec 12 13:30:55 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Dec 12 13:30:55 np0005557561.novalocal systemd-udevd[96650]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:30:55 np0005557561.novalocal NetworkManager[858]: [1765564255.5718] device (tapdbd645e4-9a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:30:55 np0005557561.novalocal NetworkManager[858]: [1765564255.5725] device (tapdbd645e4-9a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:30:55 np0005557561.novalocal sudo[96662]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpgf2eciep/privsep.sock Dec 12 13:30:55 np0005557561.novalocal systemd[1]: Started Session c110 of User root. Dec 12 13:30:55 np0005557561.novalocal sudo[96662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:30:56 np0005557561.novalocal sudo[96662]: pam_unix(sudo:session): session closed for user root Dec 12 13:30:57 np0005557561.novalocal NetworkManager[858]: [1765564257.3126] manager: (tap642d54bd-10): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Dec 12 13:30:57 np0005557561.novalocal systemd-udevd[96649]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:30:57 np0005557561.novalocal NetworkManager[858]: [1765564257.3672] device (tap642d54bd-10): carrier: link connected Dec 12 13:30:57 np0005557561.novalocal kernel: tap642d54bd-10: entered promiscuous mode Dec 12 13:30:57 np0005557561.novalocal sudo[96709]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-642d54bd-1a4d-4ccd-b888-2bc52e88420e env PROCESS_TAG=haproxy-642d54bd-1a4d-4ccd-b888-2bc52e88420e haproxy -f /var/lib/neutron/ovn-metadata-proxy/642d54bd-1a4d-4ccd-b888-2bc52e88420e.conf Dec 12 13:30:57 np0005557561.novalocal systemd[1]: Started Session c111 of User root. Dec 12 13:30:57 np0005557561.novalocal sudo[96709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:30:58 np0005557561.novalocal sudo[96709]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:31:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:31:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:31:07 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:31:07 np0005557561.novalocal sudo[96739]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:31:07 np0005557561.novalocal systemd[1]: Started Session c112 of User root. Dec 12 13:31:07 np0005557561.novalocal sudo[96739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:07 np0005557561.novalocal sudo[96739]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:07 np0005557561.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Dec 12 13:31:07 np0005557561.novalocal sudo[96743]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 crqyxMhf2JRh439FCSrW 72MVKGcGXvgCkT6t False -p3260 -a::1 Dec 12 13:31:07 np0005557561.novalocal systemd[1]: Started Session c113 of User root. Dec 12 13:31:07 np0005557561.novalocal sudo[96743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:07 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:31:08 np0005557561.novalocal sudo[96743]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:08 np0005557561.novalocal systemd[1]: session-c113.scope: Deactivated successfully. Dec 12 13:31:08 np0005557561.novalocal sudo[96756]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:31:08 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Dec 12 13:31:08 np0005557561.novalocal systemd[1]: Started Session c114 of User root. Dec 12 13:31:08 np0005557561.novalocal sudo[96756]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:08 np0005557561.novalocal sudo[96756]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:08 np0005557561.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Dec 12 13:31:08 np0005557561.novalocal sudo[96769]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:08 np0005557561.novalocal systemd[1]: Started Session c115 of User root. Dec 12 13:31:08 np0005557561.novalocal sudo[96771]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:31:08 np0005557561.novalocal sudo[96769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:08 np0005557561.novalocal systemd[1]: Started Session c116 of User root. Dec 12 13:31:08 np0005557561.novalocal sudo[96771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:09 np0005557561.novalocal sudo[96771]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:09 np0005557561.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Dec 12 13:31:09 np0005557561.novalocal sudo[96778]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:31:09 np0005557561.novalocal systemd[1]: Started Session c117 of User root. Dec 12 13:31:09 np0005557561.novalocal sudo[96778]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:09 np0005557561.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Dec 12 13:31:09 np0005557561.novalocal sudo[96769]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:09 np0005557561.novalocal sudo[96782]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 crqyxMhf2JRh439FCSrW 72MVKGcGXvgCkT6t iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:31:09 np0005557561.novalocal systemd[1]: Started Session c118 of User root. Dec 12 13:31:09 np0005557561.novalocal sudo[96782]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l acf14ef4-078b-4d4f-9454-c64422575eb0 Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal sudo[96778]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:09 np0005557561.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 12 13:31:09 np0005557561.novalocal sudo[96792]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 6fa36c8e-d59e-444c-84da-909ec068864f Dec 12 13:31:09 np0005557561.novalocal systemd[1]: Started Session c119 of User root. Dec 12 13:31:09 np0005557561.novalocal sudo[96792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: failed to retrieve rpm info for path '/dev/vda1': Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8cd54f3e-40ef-4463-8af1-68f42ca3d9aa Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 8f220f65-6433-41b1-b7a1-42746b636a12 Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 89b19101-447c-4355-bd15-754d45cfc88f Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 066e9109-1221-4cb5-b954-dfbad3f63bec Dec 12 13:31:09 np0005557561.novalocal sudo[96782]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 97a8481f-5c85-4994-955f-3e3ee6d43da1 Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-xdV9sT. For complete SELinux messages run: sealert -l 4952bdb3-9391-4cf7-9096-1f55421305f5 Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-xdV9sT. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-xdV9sT file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2b2f3b47-b1b5-4ac9-8984-2c4ebceac58c Dec 12 13:31:09 np0005557561.novalocal sudo[96797]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 72b24120-684c-4762-a15f-7cac90c3f7c8 Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 66d9e815-a12e-4b51-b4ac-ea75729ee8b2 Dec 12 13:31:09 np0005557561.novalocal systemd[1]: Started Session c120 of User root. Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l eb5573bd-dcb1-43a0-adbf-71f988affa5f Dec 12 13:31:09 np0005557561.novalocal sudo[96797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 1759adec-cca7-44f5-a708-263993c6a892 Dec 12 13:31:09 np0005557561.novalocal sudo[96792]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:09 np0005557561.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Dec 12 13:31:09 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:09 np0005557561.novalocal sudo[96801]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:31:10 np0005557561.novalocal systemd[1]: Started Session c121 of User root. Dec 12 13:31:10 np0005557561.novalocal sudo[96801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:10 np0005557561.novalocal sudo[96801]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:10 np0005557561.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Dec 12 13:31:10 np0005557561.novalocal sudo[96797]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:10 np0005557561.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Dec 12 13:31:10 np0005557561.novalocal kernel: tapdbd645e4-9a (unregistering): left promiscuous mode Dec 12 13:31:10 np0005557561.novalocal NetworkManager[858]: [1765564270.8669] device (tapdbd645e4-9a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:31:10 np0005557561.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Dec 12 13:31:10 np0005557561.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 10.868s CPU time. Dec 12 13:31:10 np0005557561.novalocal systemd-machined[90553]: Machine qemu-1-instance-00000001 terminated. Dec 12 13:31:10 np0005557561.novalocal kernel: tap642d54bd-10: left promiscuous mode Dec 12 13:31:10 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:31:10 np0005557561.novalocal kernel: scsi host3: iSCSI Initiator over TCP/IP Dec 12 13:31:11 np0005557561.novalocal iscsid[74102]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:31:11 np0005557561.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Dec 12 13:31:11 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d642d54bd\x2d1a4d\x2d4ccd\x2db888\x2d2bc52e88420e.mount: Deactivated successfully. Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:11 np0005557561.novalocal kernel: scsi 3:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:31:11 np0005557561.novalocal kernel: scsi 3:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:31:11 np0005557561.novalocal kernel: scsi 3:0:0:0: alua: device naa.60014056f9ab1deb9494f41ac57df331 port group 0 rel port 2 Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: Attached scsi generic sg2 type 0 Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Write Protect is off Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Mode Sense: 43 00 10 08 Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 12 13:31:11 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Preferred minimum I/O size 65536 bytes Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Optimal transfer size 65536 bytes Dec 12 13:31:11 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:31:11 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:31:11 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:31:11 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:31:11 np0005557561.novalocal kernel: sdb: sdb1 sdb15 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:31:11 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:31:11 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Attached SCSI disk Dec 12 13:31:11 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Dec 12 13:31:11 np0005557561.novalocal kernel: GPT:229375 != 2097151 Dec 12 13:31:11 np0005557561.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Dec 12 13:31:11 np0005557561.novalocal kernel: sda: sda1 sda15 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f1f203e9-efe8-4c29-b50d-418f61145b52 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 553e53f7-007a-4626-b1e7-df9c08c3c0e7 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 18de36e7-422b-4e0b-b1b4-bac754acfd4a Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: failed to retrieve rpm info for path '/sys/class/scsi_host/host3/scan': Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l 775da861-f40d-4a03-b318-3b617fa21098 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l d458f633-16a0-4782-bdae-f5f2ed64d219 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host3/scan. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:31:11 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host3/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:31:11 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 12 13:31:11 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 12 13:31:11 np0005557561.novalocal iscsid[74102]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:31:12 np0005557561.novalocal sudo[96943]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sdb Dec 12 13:31:12 np0005557561.novalocal systemd[1]: Started Session c122 of User root. Dec 12 13:31:12 np0005557561.novalocal sudo[96943]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: failed to retrieve rpm info for path '/dev/sdb': Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 8cd54f3e-40ef-4463-8af1-68f42ca3d9aa Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 86104987-dff1-41ea-ba76-9ec67dc48fbc Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ea7a77f2-cb5e-49c2-bd6a-10ce6102e10a Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 3076a216-a798-49e8-ad9c-02c6231e7736 Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 0a47c81c-4a5e-4e4c-bb75-b70e67b86d3a Dec 12 13:31:12 np0005557561.novalocal sudo[96943]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:12 np0005557561.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a0060ab6-b7e7-4628-8eb2-8dea9cbb22fa Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 41867ef8-0455-4582-89f8-b834743ea318 Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. For complete SELinux messages run: sealert -l bd25425e-5eaa-448f-a214-d2842eca5231 Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:31:12 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:13 np0005557561.novalocal sudo[96958]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sdb Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sdb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sdb blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:31:13 np0005557561.novalocal systemd[1]: Started Session c123 of User root. Dec 12 13:31:13 np0005557561.novalocal sudo[96958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:31:13 np0005557561.novalocal sudo[96958]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:13 np0005557561.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:31:13 np0005557561.novalocal kernel: sd 3:0:0:0: [sdb] Synchronizing SCSI cache Dec 12 13:31:13 np0005557561.novalocal kernel: scsi 3:0:0:0: alua: Detached Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:31:13 np0005557561.novalocal iscsid[74102]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:31:13 np0005557561.novalocal sudo[97001]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:31:13 np0005557561.novalocal systemd[1]: Started Session c124 of User root. Dec 12 13:31:13 np0005557561.novalocal sudo[97001]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:31:13 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l f5d5cdbc-f9bb-40ef-b3f7-c3304e8e4c4e Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 540e61fc-5554-43ec-b173-135c94ec20a2 Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. For complete SELinux messages run: sealert -l 327f2e14-33a5-4557-b7a7-200df3637fbf Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:31:14 np0005557561.novalocal setroubleshoot[96735]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:31:14 np0005557561.novalocal sudo[97001]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:14 np0005557561.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Dec 12 13:31:14 np0005557561.novalocal sudo[97011]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:14 np0005557561.novalocal systemd[1]: Started Session c125 of User root. Dec 12 13:31:14 np0005557561.novalocal sudo[97011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:14 np0005557561.novalocal sudo[97011]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:14 np0005557561.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Dec 12 13:31:14 np0005557561.novalocal sudo[97016]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:31:14 np0005557561.novalocal systemd[1]: Started Session c126 of User root. Dec 12 13:31:14 np0005557561.novalocal sudo[97016]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:15 np0005557561.novalocal sudo[97016]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:15 np0005557561.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Dec 12 13:31:15 np0005557561.novalocal sudo[97021]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:31:15 np0005557561.novalocal systemd[1]: Started Session c127 of User root. Dec 12 13:31:15 np0005557561.novalocal sudo[97021]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:16 np0005557561.novalocal sudo[97021]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:16 np0005557561.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Dec 12 13:31:16 np0005557561.novalocal sudo[97026]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:16 np0005557561.novalocal systemd[1]: Started Session c128 of User root. Dec 12 13:31:16 np0005557561.novalocal sudo[97026]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:16 np0005557561.novalocal sudo[97026]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:16 np0005557561.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Dec 12 13:31:16 np0005557561.novalocal sudo[97031]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:31:16 np0005557561.novalocal systemd[1]: Started Session c129 of User root. Dec 12 13:31:16 np0005557561.novalocal sudo[97031]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:16 np0005557561.novalocal sudo[97038]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmprf4wvg2s/privsep.sock Dec 12 13:31:17 np0005557561.novalocal systemd[1]: Started Session c130 of User root. Dec 12 13:31:17 np0005557561.novalocal sudo[97038]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Dec 12 13:31:17 np0005557561.novalocal sudo[97031]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:17 np0005557561.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Dec 12 13:31:17 np0005557561.novalocal sudo[97044]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:17 np0005557561.novalocal systemd[1]: Started Session c131 of User root. Dec 12 13:31:17 np0005557561.novalocal sudo[97044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:17 np0005557561.novalocal sudo[97044]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:17 np0005557561.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Dec 12 13:31:17 np0005557561.novalocal sudo[97052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:31:17 np0005557561.novalocal systemd[1]: Started Session c132 of User root. Dec 12 13:31:17 np0005557561.novalocal sudo[97052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:17 np0005557561.novalocal sudo[97038]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:18 np0005557561.novalocal sudo[97052]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:18 np0005557561.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Dec 12 13:31:18 np0005557561.novalocal sudo[97068]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:31:18 np0005557561.novalocal systemd[1]: Started Session c133 of User root. Dec 12 13:31:18 np0005557561.novalocal sudo[97068]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:18 np0005557561.novalocal sudo[97068]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:19 np0005557561.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Dec 12 13:31:19 np0005557561.novalocal sudo[97080]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:31:19 np0005557561.novalocal systemd[1]: Started Session c134 of User root. Dec 12 13:31:19 np0005557561.novalocal sudo[97080]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:19 np0005557561.novalocal sudo[97080]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:19 np0005557561.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Dec 12 13:31:20 np0005557561.novalocal sudo[97086]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:31:20 np0005557561.novalocal systemd[1]: Started Session c135 of User root. Dec 12 13:31:20 np0005557561.novalocal sudo[97086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:20 np0005557561.novalocal kernel: tap06e32f34-9f: entered promiscuous mode Dec 12 13:31:20 np0005557561.novalocal NetworkManager[858]: [1765564280.6399] manager: (tap06e32f34-9f): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Dec 12 13:31:20 np0005557561.novalocal sudo[97086]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:20 np0005557561.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Dec 12 13:31:20 np0005557561.novalocal systemd-udevd[97105]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:31:20 np0005557561.novalocal virtqemud[93658]: Domain id=2 name='instance-00000002' uuid=a62295d7-8f82-423a-bc62-bec0963bc229 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:31:20 np0005557561.novalocal virtqemud[93658]: Domain id=2 name='instance-00000002' uuid=a62295d7-8f82-423a-bc62-bec0963bc229 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:31:20 np0005557561.novalocal sudo[97104]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:31:20 np0005557561.novalocal systemd-machined[90553]: New machine qemu-2-instance-00000002. Dec 12 13:31:20 np0005557561.novalocal NetworkManager[858]: [1765564280.7302] device (tap06e32f34-9f): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:31:20 np0005557561.novalocal NetworkManager[858]: [1765564280.7309] device (tap06e32f34-9f): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:31:20 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Dec 12 13:31:20 np0005557561.novalocal systemd[1]: Started Session c136 of User root. Dec 12 13:31:20 np0005557561.novalocal sudo[97104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:20 np0005557561.novalocal NetworkManager[858]: [1765564280.8337] manager: (tap6ef8d62a-80): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Dec 12 13:31:20 np0005557561.novalocal systemd-udevd[97112]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:31:20 np0005557561.novalocal NetworkManager[858]: [1765564280.9043] device (tap6ef8d62a-80): carrier: link connected Dec 12 13:31:21 np0005557561.novalocal kernel: tap6ef8d62a-80: entered promiscuous mode Dec 12 13:31:21 np0005557561.novalocal sudo[97161]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2 env PROCESS_TAG=haproxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2.conf Dec 12 13:31:21 np0005557561.novalocal sudo[97104]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:21 np0005557561.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Dec 12 13:31:21 np0005557561.novalocal systemd[1]: Started Session c137 of User root. Dec 12 13:31:21 np0005557561.novalocal sudo[97163]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:31:21 np0005557561.novalocal sudo[97161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:31:21 np0005557561.novalocal systemd[1]: Started Session c138 of User root. Dec 12 13:31:21 np0005557561.novalocal sudo[97163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:21 np0005557561.novalocal sudo[97161]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:21 np0005557561.novalocal sudo[97163]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:21 np0005557561.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Dec 12 13:31:21 np0005557561.novalocal sudo[97178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-93582e79-5ff0-420b-9d2f-a5ed92a3de37 Dec 12 13:31:21 np0005557561.novalocal systemd[1]: Started Session c139 of User root. Dec 12 13:31:21 np0005557561.novalocal sudo[97178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:22 np0005557561.novalocal lvm[97183]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:31:22 np0005557561.novalocal lvm[97183]: VG cinder-volumes finished Dec 12 13:31:22 np0005557561.novalocal sudo[97178]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:22 np0005557561.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Dec 12 13:31:22 np0005557561.novalocal sudo[97184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:31:22 np0005557561.novalocal systemd[1]: Started Session c140 of User root. Dec 12 13:31:22 np0005557561.novalocal sudo[97184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:22 np0005557561.novalocal sudo[97184]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:22 np0005557561.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Dec 12 13:31:22 np0005557561.novalocal sudo[97188]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:31:22 np0005557561.novalocal systemd[1]: Started Session c141 of User root. Dec 12 13:31:22 np0005557561.novalocal sudo[97188]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:23 np0005557561.novalocal sudo[97188]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:23 np0005557561.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Dec 12 13:31:23 np0005557561.novalocal sudo[97192]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:31:23 np0005557561.novalocal systemd[1]: Started Session c142 of User root. Dec 12 13:31:23 np0005557561.novalocal sudo[97192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:23 np0005557561.novalocal sudo[97192]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:23 np0005557561.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Dec 12 13:31:23 np0005557561.novalocal sudo[97196]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:31:23 np0005557561.novalocal systemd[1]: Started Session c143 of User root. Dec 12 13:31:23 np0005557561.novalocal sudo[97196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:31:23 np0005557561.novalocal sudo[97196]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:23 np0005557561.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Dec 12 13:31:24 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Dec 12 13:31:24 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.228s CPU time. Dec 12 13:31:24 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:31:24 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 3.956s CPU time. Dec 12 13:31:32 np0005557561.novalocal sshd-session[97221]: Invalid user admin from 45.148.10.121 port 53310 Dec 12 13:31:32 np0005557561.novalocal sshd-session[97221]: Connection closed by invalid user admin 45.148.10.121 port 53310 [preauth] Dec 12 13:31:40 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:31:40 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:31:41 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Dec 12 13:31:42 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59060 [12/Dec/2025:13:31:39.475] listener listener/metadata 0/0/0/3025/3025 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l b3601f6e-c294-4dda-bfd4-a62a6b3a6083 Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3': Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 297dddf0-71d7-4479-837f-6867bbf903a6 Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l e89568c4-43cc-4d3f-bb9d-b31b3060d626 Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 25307882-2cde-425f-bedc-5ac7d20e4820 Dec 12 13:31:42 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l b3601f6e-c294-4dda-bfd4-a62a6b3a6083 Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from read access on the file e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 297dddf0-71d7-4479-837f-6867bbf903a6 Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l e89568c4-43cc-4d3f-bb9d-b31b3060d626 Dec 12 13:31:43 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:44 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. For complete SELinux messages run: sealert -l 25307882-2cde-425f-bedc-5ac7d20e4820 Dec 12 13:31:44 np0005557561.novalocal setroubleshoot[97231]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the e13771f2e43d953269efb9bad59506b6fc857c7c66c8b355ac33a3e3187335d3 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59070 [12/Dec/2025:13:31:42.562] listener listener/metadata 0/0/0/1844/1844 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59074 [12/Dec/2025:13:31:44.465] listener listener/metadata 0/0/0/15/15 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59084 [12/Dec/2025:13:31:44.544] listener listener/metadata 0/0/0/13/13 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59096 [12/Dec/2025:13:31:44.594] listener listener/metadata 0/0/0/24/24 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59098 [12/Dec/2025:13:31:44.656] listener listener/metadata 0/0/0/13/13 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59106 [12/Dec/2025:13:31:44.737] listener listener/metadata 0/0/0/14/14 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:59120 [12/Dec/2025:13:31:44.807] listener listener/metadata 0/0/0/12/12 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46266 [12/Dec/2025:13:31:44.869] listener listener/metadata 0/0/0/13/13 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46274 [12/Dec/2025:13:31:44.920] listener listener/metadata 0/0/0/12/12 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 12 13:31:44 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46276 [12/Dec/2025:13:31:44.969] listener listener/metadata 0/0/0/13/13 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 12 13:31:45 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46288 [12/Dec/2025:13:31:45.024] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 12 13:31:45 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46302 [12/Dec/2025:13:31:45.069] listener listener/metadata 0/0/0/15/15 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 12 13:31:45 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46316 [12/Dec/2025:13:31:45.141] listener listener/metadata 0/0/0/13/13 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 12 13:31:45 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46318 [12/Dec/2025:13:31:45.205] listener listener/metadata 0/0/0/13/13 200 152 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 12 13:31:45 np0005557561.novalocal haproxy-metadata-proxy-6ef8d62a-8fca-44e4-9eb1-93288fa8f5d2[97170]: 10.100.0.7:46320 [12/Dec/2025:13:31:45.256] listener listener/metadata 0/0/0/13/13 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 12 13:31:52 np0005557561.novalocal kernel: tapec8b8f4d-f9: entered promiscuous mode Dec 12 13:31:52 np0005557561.novalocal NetworkManager[858]: [1765564312.9227] manager: (tapec8b8f4d-f9): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Dec 12 13:31:52 np0005557561.novalocal virtqemud[93658]: Domain id=3 name='instance-00000003' uuid=42b5efd3-36fa-4bb2-8781-59919d883806 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:31:52 np0005557561.novalocal virtqemud[93658]: Domain id=3 name='instance-00000003' uuid=42b5efd3-36fa-4bb2-8781-59919d883806 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:31:52 np0005557561.novalocal systemd-machined[90553]: New machine qemu-3-instance-00000003. Dec 12 13:31:52 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Dec 12 13:31:53 np0005557561.novalocal systemd-udevd[97348]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:31:53 np0005557561.novalocal NetworkManager[858]: [1765564313.0323] device (tapec8b8f4d-f9): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:31:53 np0005557561.novalocal NetworkManager[858]: [1765564313.0329] device (tapec8b8f4d-f9): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:31:53 np0005557561.novalocal NetworkManager[858]: [1765564313.0866] manager: (tap8279a2f6-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Dec 12 13:31:53 np0005557561.novalocal NetworkManager[858]: [1765564313.1733] device (tap8279a2f6-a0): carrier: link connected Dec 12 13:31:53 np0005557561.novalocal kernel: tap8279a2f6-a0: entered promiscuous mode Dec 12 13:31:53 np0005557561.novalocal sudo[97393]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-8279a2f6-ad2c-4129-92b6-1e394a4217ac env PROCESS_TAG=haproxy-8279a2f6-ad2c-4129-92b6-1e394a4217ac haproxy -f /var/lib/neutron/ovn-metadata-proxy/8279a2f6-ad2c-4129-92b6-1e394a4217ac.conf Dec 12 13:31:53 np0005557561.novalocal systemd[1]: Started Session c144 of User root. Dec 12 13:31:53 np0005557561.novalocal sudo[97393]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:31:53 np0005557561.novalocal sudo[97393]: pam_unix(sudo:session): session closed for user root Dec 12 13:31:54 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Dec 12 13:31:54 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.260s CPU time. Dec 12 13:31:54 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:31:54 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.528s CPU time. Dec 12 13:32:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:32:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:32:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:32:05 np0005557561.novalocal kernel: tapec8b8f4d-f9 (unregistering): left promiscuous mode Dec 12 13:32:05 np0005557561.novalocal NetworkManager[858]: [1765564325.5558] device (tapec8b8f4d-f9): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:32:05 np0005557561.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Dec 12 13:32:05 np0005557561.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 11.110s CPU time. Dec 12 13:32:05 np0005557561.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Dec 12 13:32:05 np0005557561.novalocal kernel: tap8279a2f6-a0: left promiscuous mode Dec 12 13:32:05 np0005557561.novalocal systemd-machined[90553]: Machine qemu-3-instance-00000003 terminated. Dec 12 13:32:05 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d8279a2f6\x2dad2c\x2d4129\x2d92b6\x2d1e394a4217ac.mount: Deactivated successfully. Dec 12 13:32:17 np0005557561.novalocal kernel: tap06e32f34-9f (unregistering): left promiscuous mode Dec 12 13:32:17 np0005557561.novalocal NetworkManager[858]: [1765564337.0740] device (tap06e32f34-9f): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:32:17 np0005557561.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Dec 12 13:32:17 np0005557561.novalocal kernel: tap6ef8d62a-80: left promiscuous mode Dec 12 13:32:17 np0005557561.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Dec 12 13:32:17 np0005557561.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 19.939s CPU time. Dec 12 13:32:17 np0005557561.novalocal systemd-machined[90553]: Machine qemu-2-instance-00000002 terminated. Dec 12 13:32:17 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d6ef8d62a\x2d8fca\x2d44e4\x2d9eb1\x2d93288fa8f5d2.mount: Deactivated successfully. Dec 12 13:32:38 np0005557561.novalocal kernel: tap573bfec0-b0: entered promiscuous mode Dec 12 13:32:38 np0005557561.novalocal NetworkManager[858]: [1765564358.9612] manager: (tap573bfec0-b0): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Dec 12 13:32:38 np0005557561.novalocal virtqemud[93658]: Domain id=4 name='instance-00000004' uuid=f146211d-886c-4c64-a56e-aefcd8201443 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:32:38 np0005557561.novalocal virtqemud[93658]: Domain id=4 name='instance-00000004' uuid=f146211d-886c-4c64-a56e-aefcd8201443 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:32:39 np0005557561.novalocal systemd-machined[90553]: New machine qemu-4-instance-00000004. Dec 12 13:32:39 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Dec 12 13:32:39 np0005557561.novalocal systemd-udevd[97571]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:32:39 np0005557561.novalocal NetworkManager[858]: [1765564359.0784] device (tap573bfec0-b0): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:32:39 np0005557561.novalocal NetworkManager[858]: [1765564359.0811] device (tap573bfec0-b0): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:32:39 np0005557561.novalocal NetworkManager[858]: [1765564359.1020] manager: (tap6518e62b-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Dec 12 13:32:39 np0005557561.novalocal NetworkManager[858]: [1765564359.1768] device (tap6518e62b-d0): carrier: link connected Dec 12 13:32:39 np0005557561.novalocal kernel: tap6518e62b-d0: entered promiscuous mode Dec 12 13:32:39 np0005557561.novalocal sudo[97614]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6518e62b-dca3-463b-83bf-d264cb256970 env PROCESS_TAG=haproxy-6518e62b-dca3-463b-83bf-d264cb256970 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6518e62b-dca3-463b-83bf-d264cb256970.conf Dec 12 13:32:39 np0005557561.novalocal systemd[1]: Started Session c145 of User root. Dec 12 13:32:39 np0005557561.novalocal sudo[97614]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:32:39 np0005557561.novalocal sudo[97614]: pam_unix(sudo:session): session closed for user root Dec 12 13:32:51 np0005557561.novalocal kernel: tap45d5680e-9e: entered promiscuous mode Dec 12 13:32:51 np0005557561.novalocal NetworkManager[858]: [1765564371.0488] manager: (tap45d5680e-9e): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Dec 12 13:32:51 np0005557561.novalocal virtqemud[93658]: Domain id=5 name='instance-00000005' uuid=ae1f77a8-33b0-48a7-9ee1-9e75467d6678 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:32:51 np0005557561.novalocal virtqemud[93658]: Domain id=5 name='instance-00000005' uuid=ae1f77a8-33b0-48a7-9ee1-9e75467d6678 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:32:51 np0005557561.novalocal systemd-udevd[97704]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:32:51 np0005557561.novalocal systemd-machined[90553]: New machine qemu-5-instance-00000005. Dec 12 13:32:51 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Dec 12 13:32:51 np0005557561.novalocal NetworkManager[858]: [1765564371.1504] device (tap45d5680e-9e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:32:51 np0005557561.novalocal NetworkManager[858]: [1765564371.1509] device (tap45d5680e-9e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:32:51 np0005557561.novalocal systemd-udevd[97711]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:32:51 np0005557561.novalocal NetworkManager[858]: [1765564371.2224] manager: (tap79b4578b-50): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Dec 12 13:32:51 np0005557561.novalocal NetworkManager[858]: [1765564371.2842] device (tap79b4578b-50): carrier: link connected Dec 12 13:32:51 np0005557561.novalocal kernel: tap79b4578b-50: entered promiscuous mode Dec 12 13:32:51 np0005557561.novalocal sudo[97755]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-79b4578b-5018-4e8e-847c-15fa64934eb4 env PROCESS_TAG=haproxy-79b4578b-5018-4e8e-847c-15fa64934eb4 haproxy -f /var/lib/neutron/ovn-metadata-proxy/79b4578b-5018-4e8e-847c-15fa64934eb4.conf Dec 12 13:32:51 np0005557561.novalocal systemd[1]: Started Session c146 of User root. Dec 12 13:32:51 np0005557561.novalocal sudo[97755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:32:51 np0005557561.novalocal sudo[97755]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:54998 [12/Dec/2025:13:33:01.554] listener listener/metadata 0/0/0/142/142 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55002 [12/Dec/2025:13:33:01.758] listener listener/metadata 0/0/0/12/12 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55006 [12/Dec/2025:13:33:01.799] listener listener/metadata 0/0/0/14/14 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55014 [12/Dec/2025:13:33:01.855] listener listener/metadata 0/0/0/27/27 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55028 [12/Dec/2025:13:33:01.924] listener listener/metadata 0/0/0/12/12 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 12 13:33:01 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55040 [12/Dec/2025:13:33:01.976] listener listener/metadata 0/0/0/10/10 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55048 [12/Dec/2025:13:33:02.053] listener listener/metadata 0/0/0/11/11 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55062 [12/Dec/2025:13:33:02.110] listener listener/metadata 0/0/0/11/11 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55070 [12/Dec/2025:13:33:02.160] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55086 [12/Dec/2025:13:33:02.210] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55090 [12/Dec/2025:13:33:02.266] listener listener/metadata 0/0/0/13/13 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55106 [12/Dec/2025:13:33:02.319] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55122 [12/Dec/2025:13:33:02.358] listener listener/metadata 0/0/0/14/14 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55136 [12/Dec/2025:13:33:02.401] listener listener/metadata 0/0/0/15/15 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55152 [12/Dec/2025:13:33:02.454] listener listener/metadata 0/0/0/12/12 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 12 13:33:02 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[97620]: 10.100.0.14:55162 [12/Dec/2025:13:33:02.549] listener listener/metadata 0/0/0/14/14 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 12 13:33:03 np0005557561.novalocal kernel: tap45d5680e-9e (unregistering): left promiscuous mode Dec 12 13:33:03 np0005557561.novalocal NetworkManager[858]: [1765564383.0452] device (tap45d5680e-9e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:33:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:33:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:33:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:33:03 np0005557561.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Dec 12 13:33:03 np0005557561.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 11.103s CPU time. Dec 12 13:33:03 np0005557561.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Dec 12 13:33:03 np0005557561.novalocal systemd-machined[90553]: Machine qemu-5-instance-00000005 terminated. Dec 12 13:33:03 np0005557561.novalocal kernel: tap79b4578b-50: left promiscuous mode Dec 12 13:33:03 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d79b4578b\x2d5018\x2d4e8e\x2d847c\x2d15fa64934eb4.mount: Deactivated successfully. Dec 12 13:33:03 np0005557561.novalocal sshd-session[97820]: Connection closed by authenticating user root 167.71.2.158 port 38602 [preauth] Dec 12 13:33:08 np0005557561.novalocal sudo[97866]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:33:08 np0005557561.novalocal systemd[1]: Started Session c147 of User root. Dec 12 13:33:08 np0005557561.novalocal sudo[97866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:33:09 np0005557561.novalocal sudo[97866]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:09 np0005557561.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Dec 12 13:33:09 np0005557561.novalocal sudo[97870]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:33:09 np0005557561.novalocal systemd[1]: Started Session c148 of User root. Dec 12 13:33:09 np0005557561.novalocal sudo[97870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:33:09 np0005557561.novalocal sudo[97870]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:09 np0005557561.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Dec 12 13:33:09 np0005557561.novalocal sudo[97875]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:33:09 np0005557561.novalocal systemd[1]: Started Session c149 of User root. Dec 12 13:33:09 np0005557561.novalocal sudo[97875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:33:10 np0005557561.novalocal sudo[97875]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:10 np0005557561.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Dec 12 13:33:10 np0005557561.novalocal sudo[97879]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:33:10 np0005557561.novalocal systemd[1]: Started Session c150 of User root. Dec 12 13:33:10 np0005557561.novalocal sudo[97879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:33:10 np0005557561.novalocal sudo[97879]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:10 np0005557561.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Dec 12 13:33:12 np0005557561.novalocal kernel: tap573bfec0-b0 (unregistering): left promiscuous mode Dec 12 13:33:12 np0005557561.novalocal NetworkManager[858]: [1765564392.7081] device (tap573bfec0-b0): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:33:12 np0005557561.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Dec 12 13:33:12 np0005557561.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 17.168s CPU time. Dec 12 13:33:12 np0005557561.novalocal systemd-machined[90553]: Machine qemu-4-instance-00000004 terminated. Dec 12 13:33:12 np0005557561.novalocal kernel: tap6518e62b-d0: left promiscuous mode Dec 12 13:33:12 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d6518e62b\x2ddca3\x2d463b\x2d83bf\x2dd264cb256970.mount: Deactivated successfully. Dec 12 13:33:12 np0005557561.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Dec 12 13:33:16 np0005557561.novalocal kernel: tap573bfec0-b0: entered promiscuous mode Dec 12 13:33:16 np0005557561.novalocal NetworkManager[858]: [1765564396.0540] manager: (tap573bfec0-b0): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Dec 12 13:33:16 np0005557561.novalocal virtqemud[93658]: Domain id=6 name='instance-00000004' uuid=f146211d-886c-4c64-a56e-aefcd8201443 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:33:16 np0005557561.novalocal virtqemud[93658]: Domain id=6 name='instance-00000004' uuid=f146211d-886c-4c64-a56e-aefcd8201443 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:33:16 np0005557561.novalocal systemd-machined[90553]: New machine qemu-6-instance-00000004. Dec 12 13:33:16 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Dec 12 13:33:16 np0005557561.novalocal systemd-udevd[97954]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:33:16 np0005557561.novalocal NetworkManager[858]: [1765564396.1768] manager: (tap6518e62b-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Dec 12 13:33:16 np0005557561.novalocal systemd-udevd[97958]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:33:16 np0005557561.novalocal NetworkManager[858]: [1765564396.1808] device (tap573bfec0-b0): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:33:16 np0005557561.novalocal NetworkManager[858]: [1765564396.1815] device (tap573bfec0-b0): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:33:16 np0005557561.novalocal NetworkManager[858]: [1765564396.2357] device (tap6518e62b-d0): carrier: link connected Dec 12 13:33:16 np0005557561.novalocal kernel: tap6518e62b-d0: entered promiscuous mode Dec 12 13:33:16 np0005557561.novalocal sudo[97996]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6518e62b-dca3-463b-83bf-d264cb256970 env PROCESS_TAG=haproxy-6518e62b-dca3-463b-83bf-d264cb256970 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6518e62b-dca3-463b-83bf-d264cb256970.conf Dec 12 13:33:16 np0005557561.novalocal systemd[1]: Started Session c151 of User root. Dec 12 13:33:16 np0005557561.novalocal sudo[97996]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:33:16 np0005557561.novalocal sudo[97996]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:24 np0005557561.novalocal sshd-session[98016]: Received disconnect from 193.46.255.20 port 31959:11: [preauth] Dec 12 13:33:24 np0005557561.novalocal sshd-session[98016]: Disconnected from authenticating user root 193.46.255.20 port 31959 [preauth] Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51670 [12/Dec/2025:13:33:32.194] listener listener/metadata 0/0/0/152/152 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51680 [12/Dec/2025:13:33:32.421] listener listener/metadata 0/0/0/14/14 200 115 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51684 [12/Dec/2025:13:33:32.472] listener listener/metadata 0/0/0/14/14 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51698 [12/Dec/2025:13:33:32.526] listener listener/metadata 0/0/0/14/14 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51714 [12/Dec/2025:13:33:32.578] listener listener/metadata 0/0/0/15/15 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51722 [12/Dec/2025:13:33:32.632] listener listener/metadata 0/0/0/14/14 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51726 [12/Dec/2025:13:33:32.687] listener listener/metadata 0/0/0/14/14 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51740 [12/Dec/2025:13:33:32.748] listener listener/metadata 0/0/0/11/11 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51746 [12/Dec/2025:13:33:32.794] listener listener/metadata 0/0/0/14/14 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51760 [12/Dec/2025:13:33:32.845] listener listener/metadata 0/0/0/13/13 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51772 [12/Dec/2025:13:33:32.894] listener listener/metadata 0/0/0/13/13 200 182 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 12 13:33:32 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51782 [12/Dec/2025:13:33:32.950] listener listener/metadata 0/0/0/14/14 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 12 13:33:33 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51792 [12/Dec/2025:13:33:32.999] listener listener/metadata 0/0/0/11/11 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 12 13:33:33 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51806 [12/Dec/2025:13:33:33.071] listener listener/metadata 0/0/0/14/14 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 12 13:33:33 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51810 [12/Dec/2025:13:33:33.134] listener listener/metadata 0/0/0/12/12 200 144 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 12 13:33:33 np0005557561.novalocal haproxy-metadata-proxy-6518e62b-dca3-463b-83bf-d264cb256970[98003]: 10.100.0.14:51818 [12/Dec/2025:13:33:33.196] listener listener/metadata 0/0/0/12/12 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 12 13:33:33 np0005557561.novalocal kernel: tapa4e477fa-7c: entered promiscuous mode Dec 12 13:33:33 np0005557561.novalocal NetworkManager[858]: [1765564413.6531] manager: (tapa4e477fa-7c): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Dec 12 13:33:33 np0005557561.novalocal virtqemud[93658]: Domain id=7 name='instance-00000006' uuid=375bbae1-5016-4a23-8145-c5442396a4c6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:33:33 np0005557561.novalocal virtqemud[93658]: Domain id=7 name='instance-00000006' uuid=375bbae1-5016-4a23-8145-c5442396a4c6 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:33:33 np0005557561.novalocal systemd-machined[90553]: New machine qemu-7-instance-00000006. Dec 12 13:33:33 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Dec 12 13:33:33 np0005557561.novalocal systemd-udevd[98082]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:33:33 np0005557561.novalocal NetworkManager[858]: [1765564413.7716] manager: (tap8701ac37-30): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Dec 12 13:33:33 np0005557561.novalocal systemd-udevd[98084]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:33:33 np0005557561.novalocal NetworkManager[858]: [1765564413.7737] device (tapa4e477fa-7c): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:33:33 np0005557561.novalocal NetworkManager[858]: [1765564413.7745] device (tapa4e477fa-7c): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:33:33 np0005557561.novalocal NetworkManager[858]: [1765564413.8456] device (tap8701ac37-30): carrier: link connected Dec 12 13:33:33 np0005557561.novalocal kernel: tap8701ac37-30: entered promiscuous mode Dec 12 13:33:34 np0005557561.novalocal sudo[98124]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-8701ac37-3b00-4a15-b5c0-9f820975dfa8 env PROCESS_TAG=haproxy-8701ac37-3b00-4a15-b5c0-9f820975dfa8 haproxy -f /var/lib/neutron/ovn-metadata-proxy/8701ac37-3b00-4a15-b5c0-9f820975dfa8.conf Dec 12 13:33:34 np0005557561.novalocal systemd[1]: Started Session c152 of User root. Dec 12 13:33:34 np0005557561.novalocal sudo[98124]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:33:34 np0005557561.novalocal sudo[98124]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:38 np0005557561.novalocal kernel: tap573bfec0-b0 (unregistering): left promiscuous mode Dec 12 13:33:38 np0005557561.novalocal NetworkManager[858]: [1765564418.4753] device (tap573bfec0-b0): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:33:38 np0005557561.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Dec 12 13:33:38 np0005557561.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 15.042s CPU time. Dec 12 13:33:38 np0005557561.novalocal systemd-machined[90553]: Machine qemu-6-instance-00000004 terminated. Dec 12 13:33:38 np0005557561.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Dec 12 13:33:38 np0005557561.novalocal kernel: tap6518e62b-d0: left promiscuous mode Dec 12 13:33:38 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d6518e62b\x2ddca3\x2d463b\x2d83bf\x2dd264cb256970.mount: Deactivated successfully. Dec 12 13:33:38 np0005557561.novalocal kernel: tap573bfec0-b0: entered promiscuous mode Dec 12 13:33:38 np0005557561.novalocal NetworkManager[858]: [1765564418.6868] manager: (tap573bfec0-b0): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Dec 12 13:33:38 np0005557561.novalocal systemd-udevd[98151]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:33:38 np0005557561.novalocal kernel: tap573bfec0-b0 (unregistering): left promiscuous mode Dec 12 13:33:38 np0005557561.novalocal NetworkManager[858]: [1765564418.8072] manager: (tap6518e62b-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Dec 12 13:33:38 np0005557561.novalocal NetworkManager[858]: [1765564418.8885] device (tap6518e62b-d0): carrier: link connected Dec 12 13:33:39 np0005557561.novalocal kernel: tap6518e62b-d0: entered promiscuous mode Dec 12 13:33:39 np0005557561.novalocal sudo[98208]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6518e62b-dca3-463b-83bf-d264cb256970 env PROCESS_TAG=haproxy-6518e62b-dca3-463b-83bf-d264cb256970 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6518e62b-dca3-463b-83bf-d264cb256970.conf Dec 12 13:33:39 np0005557561.novalocal systemd[1]: Started Session c153 of User root. Dec 12 13:33:39 np0005557561.novalocal sudo[98208]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:33:39 np0005557561.novalocal sudo[98208]: pam_unix(sudo:session): session closed for user root Dec 12 13:33:39 np0005557561.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Dec 12 13:33:39 np0005557561.novalocal kernel: tap6518e62b-d0: left promiscuous mode Dec 12 13:33:39 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d6518e62b\x2ddca3\x2d463b\x2d83bf\x2dd264cb256970.mount: Deactivated successfully. Dec 12 13:33:48 np0005557561.novalocal kernel: tapa4e477fa-7c (unregistering): left promiscuous mode Dec 12 13:33:48 np0005557561.novalocal NetworkManager[858]: [1765564428.2511] device (tapa4e477fa-7c): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:33:48 np0005557561.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Dec 12 13:33:48 np0005557561.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 10.997s CPU time. Dec 12 13:33:48 np0005557561.novalocal systemd-machined[90553]: Machine qemu-7-instance-00000006 terminated. Dec 12 13:33:48 np0005557561.novalocal kernel: tap8701ac37-30: left promiscuous mode Dec 12 13:33:48 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d8701ac37\x2d3b00\x2d4a15\x2db5c0\x2d9f820975dfa8.mount: Deactivated successfully. Dec 12 13:33:48 np0005557561.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Dec 12 13:33:49 np0005557561.novalocal sshd-session[98319]: Connection closed by authenticating user root 167.71.2.158 port 55222 [preauth] Dec 12 13:34:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:34:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:34:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:34:08 np0005557561.novalocal sudo[98352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:34:08 np0005557561.novalocal systemd[1]: Started Session c154 of User root. Dec 12 13:34:08 np0005557561.novalocal sudo[98352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:09 np0005557561.novalocal sudo[98352]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:09 np0005557561.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Dec 12 13:34:09 np0005557561.novalocal sudo[98356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:34:09 np0005557561.novalocal systemd[1]: Started Session c155 of User root. Dec 12 13:34:09 np0005557561.novalocal sudo[98356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:09 np0005557561.novalocal sudo[98356]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:09 np0005557561.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Dec 12 13:34:09 np0005557561.novalocal sudo[98361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:34:09 np0005557561.novalocal systemd[1]: Started Session c156 of User root. Dec 12 13:34:09 np0005557561.novalocal sudo[98361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:10 np0005557561.novalocal sudo[98361]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:10 np0005557561.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Dec 12 13:34:10 np0005557561.novalocal sudo[98367]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:34:10 np0005557561.novalocal systemd[1]: Started Session c157 of User root. Dec 12 13:34:10 np0005557561.novalocal sudo[98367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:10 np0005557561.novalocal sudo[98367]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:10 np0005557561.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Dec 12 13:34:11 np0005557561.novalocal kernel: tapd307fc8e-44: entered promiscuous mode Dec 12 13:34:11 np0005557561.novalocal NetworkManager[858]: [1765564451.4376] manager: (tapd307fc8e-44): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Dec 12 13:34:11 np0005557561.novalocal virtqemud[93658]: Domain id=8 name='instance-00000007' uuid=f92ca16f-450d-4448-b187-270f0d165747 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:34:11 np0005557561.novalocal virtqemud[93658]: Domain id=8 name='instance-00000007' uuid=f92ca16f-450d-4448-b187-270f0d165747 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:34:11 np0005557561.novalocal systemd-udevd[98388]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:34:11 np0005557561.novalocal NetworkManager[858]: [1765564451.5167] device (tapd307fc8e-44): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:34:11 np0005557561.novalocal NetworkManager[858]: [1765564451.5176] device (tapd307fc8e-44): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:34:11 np0005557561.novalocal systemd-machined[90553]: New machine qemu-8-instance-00000007. Dec 12 13:34:11 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Dec 12 13:34:11 np0005557561.novalocal systemd-udevd[98391]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:34:11 np0005557561.novalocal NetworkManager[858]: [1765564451.6049] manager: (tapdf5b4487-e0): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Dec 12 13:34:11 np0005557561.novalocal NetworkManager[858]: [1765564451.6671] device (tapdf5b4487-e0): carrier: link connected Dec 12 13:34:11 np0005557561.novalocal kernel: tapdf5b4487-e0: entered promiscuous mode Dec 12 13:34:11 np0005557561.novalocal sudo[98436]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-df5b4487-ec23-4839-be37-c7e79fc3051a env PROCESS_TAG=haproxy-df5b4487-ec23-4839-be37-c7e79fc3051a haproxy -f /var/lib/neutron/ovn-metadata-proxy/df5b4487-ec23-4839-be37-c7e79fc3051a.conf Dec 12 13:34:11 np0005557561.novalocal systemd[1]: Started Session c158 of User root. Dec 12 13:34:11 np0005557561.novalocal sudo[98436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:34:12 np0005557561.novalocal sudo[98436]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:22 np0005557561.novalocal kernel: tapd307fc8e-44 (unregistering): left promiscuous mode Dec 12 13:34:22 np0005557561.novalocal NetworkManager[858]: [1765564462.8443] device (tapd307fc8e-44): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:34:22 np0005557561.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Dec 12 13:34:22 np0005557561.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 10.507s CPU time. Dec 12 13:34:22 np0005557561.novalocal systemd-machined[90553]: Machine qemu-8-instance-00000007 terminated. Dec 12 13:34:22 np0005557561.novalocal kernel: tapdf5b4487-e0: left promiscuous mode Dec 12 13:34:23 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2ddf5b4487\x2dec23\x2d4839\x2dbe37\x2dc7e79fc3051a.mount: Deactivated successfully. Dec 12 13:34:23 np0005557561.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Dec 12 13:34:34 np0005557561.novalocal sudo[98514]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2f83a8ef-ab39-4c28-a310-f44285e062cf cinder-volumes/cinder-volumes-pool Dec 12 13:34:34 np0005557561.novalocal systemd[1]: Started Session c159 of User root. Dec 12 13:34:34 np0005557561.novalocal sudo[98514]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:34 np0005557561.novalocal lvm[98525]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:34:34 np0005557561.novalocal lvm[98525]: VG cinder-volumes finished Dec 12 13:34:34 np0005557561.novalocal sudo[98514]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:34 np0005557561.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Dec 12 13:34:35 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:34:35 np0005557561.novalocal sudo[98535]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:35 np0005557561.novalocal systemd[1]: Started Session c160 of User root. Dec 12 13:34:35 np0005557561.novalocal sudo[98535]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:36 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:34:36 np0005557561.novalocal sudo[98535]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:36 np0005557561.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Dec 12 13:34:36 np0005557561.novalocal sudo[98539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf c3KTncpPn99EDS6ECTpA y8xzG4a7tyGYy3b3 False -p3260 -a::1 Dec 12 13:34:36 np0005557561.novalocal systemd[1]: Started Session c161 of User root. Dec 12 13:34:36 np0005557561.novalocal sudo[98539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:36 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Dec 12 13:34:36 np0005557561.novalocal sudo[98539]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:36 np0005557561.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Dec 12 13:34:36 np0005557561.novalocal sudo[98560]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:34:36 np0005557561.novalocal systemd[1]: Started Session c162 of User root. Dec 12 13:34:36 np0005557561.novalocal sudo[98560]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:37 np0005557561.novalocal sshd-session[98546]: Connection closed by authenticating user root 167.71.2.158 port 41300 [preauth] Dec 12 13:34:37 np0005557561.novalocal sudo[98560]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:37 np0005557561.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Dec 12 13:34:37 np0005557561.novalocal sudo[98568]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:37 np0005557561.novalocal systemd[1]: Started Session c163 of User root. Dec 12 13:34:37 np0005557561.novalocal sudo[98568]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l dd286387-76c5-4fd9-8470-ed331cc6f50b Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 312f4cc0-88ea-461c-be0a-632c38241cb4 Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:37 np0005557561.novalocal sudo[98568]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:37 np0005557561.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: failed to retrieve rpm info for path '/dev/vda1': Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 8cd54f3e-40ef-4463-8af1-68f42ca3d9aa Dec 12 13:34:37 np0005557561.novalocal sudo[98578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf c3KTncpPn99EDS6ECTpA y8xzG4a7tyGYy3b3 iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:37 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:34:38 np0005557561.novalocal systemd[1]: Started Session c164 of User root. Dec 12 13:34:38 np0005557561.novalocal sudo[98578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 5e2b5636-e89d-43b3-8f84-91e2ba3a5d0a Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 89b19101-447c-4355-bd15-754d45cfc88f Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 066e9109-1221-4cb5-b954-dfbad3f63bec Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 97a8481f-5c85-4994-955f-3e3ee6d43da1 Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-WgtyWe. For complete SELinux messages run: sealert -l 4952bdb3-9391-4cf7-9096-1f55421305f5 Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-WgtyWe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-WgtyWe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2b2f3b47-b1b5-4ac9-8984-2c4ebceac58c Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 1759adec-cca7-44f5-a708-263993c6a892 Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 66d9e815-a12e-4b51-b4ac-ea75729ee8b2 Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l eb5573bd-dcb1-43a0-adbf-71f988affa5f Dec 12 13:34:38 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:38 np0005557561.novalocal sudo[98578]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:38 np0005557561.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Dec 12 13:34:38 np0005557561.novalocal sudo[98583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:38 np0005557561.novalocal systemd[1]: Started Session c165 of User root. Dec 12 13:34:38 np0005557561.novalocal sudo[98583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:39 np0005557561.novalocal sudo[98583]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:39 np0005557561.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:34:39 np0005557561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 12 13:34:39 np0005557561.novalocal iscsid[74102]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:34:39 np0005557561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:34:39 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:34:39 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405fb4500baaf9d4318bf6cb5cc9 port group 0 rel port 1 Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:34:39 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:39 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:34:39 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f1f203e9-efe8-4c29-b50d-418f61145b52 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 553e53f7-007a-4626-b1e7-df9c08c3c0e7 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 18de36e7-422b-4e0b-b1b4-bac754acfd4a Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l b43d10c9-ad90-47c1-9fa7-f804543c98d5 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:34:39 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:40 np0005557561.novalocal sudo[98643]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 12 13:34:40 np0005557561.novalocal systemd[1]: Started Session c166 of User root. Dec 12 13:34:40 np0005557561.novalocal sudo[98643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 775da861-f40d-4a03-b318-3b617fa21098 Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d458f633-16a0-4782-bdae-f5f2ed64d219 Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: failed to retrieve rpm info for path '/dev/sda': Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8cd54f3e-40ef-4463-8af1-68f42ca3d9aa Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:40 np0005557561.novalocal sudo[98643]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:40 np0005557561.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Dec 12 13:34:40 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 86104987-dff1-41ea-ba76-9ec67dc48fbc Dec 12 13:34:40 np0005557561.novalocal sudo[98654]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 12 13:34:40 np0005557561.novalocal systemd[1]: Started Session c167 of User root. Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:40 np0005557561.novalocal sudo[98654]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ea7a77f2-cb5e-49c2-bd6a-10ce6102e10a Dec 12 13:34:40 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 3076a216-a798-49e8-ad9c-02c6231e7736 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 0a47c81c-4a5e-4e4c-bb75-b70e67b86d3a Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a0060ab6-b7e7-4628-8eb2-8dea9cbb22fa Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 41867ef8-0455-4582-89f8-b834743ea318 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l bd25425e-5eaa-448f-a214-d2842eca5231 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 5ce1698e-bdb3-43c1-8504-78dc94ffdc9d Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:34:41 np0005557561.novalocal sudo[98654]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:41 np0005557561.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:34:41 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 12 13:34:41 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:34:41 np0005557561.novalocal iscsid[74102]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:34:41 np0005557561.novalocal sudo[98705]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:34:41 np0005557561.novalocal systemd[1]: Started Session c168 of User root. Dec 12 13:34:41 np0005557561.novalocal sudo[98705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l f5d5cdbc-f9bb-40ef-b3f7-c3304e8e4c4e Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 540e61fc-5554-43ec-b173-135c94ec20a2 Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. For complete SELinux messages run: sealert -l 327f2e14-33a5-4557-b7a7-200df3637fbf Dec 12 13:34:41 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:42 np0005557561.novalocal sudo[98705]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:42 np0005557561.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Dec 12 13:34:42 np0005557561.novalocal sudo[98715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:42 np0005557561.novalocal systemd[1]: Started Session c169 of User root. Dec 12 13:34:42 np0005557561.novalocal sudo[98715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:42 np0005557561.novalocal sudo[98715]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:42 np0005557561.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Dec 12 13:34:42 np0005557561.novalocal sudo[98720]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:34:42 np0005557561.novalocal systemd[1]: Started Session c170 of User root. Dec 12 13:34:42 np0005557561.novalocal sudo[98720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:43 np0005557561.novalocal sudo[98720]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:43 np0005557561.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Dec 12 13:34:43 np0005557561.novalocal sudo[98761]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:43 np0005557561.novalocal systemd[1]: Started Session c171 of User root. Dec 12 13:34:43 np0005557561.novalocal sudo[98761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:43 np0005557561.novalocal sudo[98761]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:43 np0005557561.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Dec 12 13:34:43 np0005557561.novalocal sudo[98766]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:43 np0005557561.novalocal systemd[1]: Started Session c172 of User root. Dec 12 13:34:43 np0005557561.novalocal sudo[98766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:44 np0005557561.novalocal sudo[98766]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:44 np0005557561.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l dd286387-76c5-4fd9-8470-ed331cc6f50b Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 312f4cc0-88ea-461c-be0a-632c38241cb4 Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 5e2b5636-e89d-43b3-8f84-91e2ba3a5d0a Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 89b19101-447c-4355-bd15-754d45cfc88f Dec 12 13:34:45 np0005557561.novalocal sudo[98784]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 066e9109-1221-4cb5-b954-dfbad3f63bec Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 97a8481f-5c85-4994-955f-3e3ee6d43da1 Dec 12 13:34:45 np0005557561.novalocal systemd[1]: Started Session c173 of User root. Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal sudo[98784]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-b23flD. For complete SELinux messages run: sealert -l 4952bdb3-9391-4cf7-9096-1f55421305f5 Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-b23flD. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-b23flD file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 2b2f3b47-b1b5-4ac9-8984-2c4ebceac58c Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 1759adec-cca7-44f5-a708-263993c6a892 Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 66d9e815-a12e-4b51-b4ac-ea75729ee8b2 Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l eb5573bd-dcb1-43a0-adbf-71f988affa5f Dec 12 13:34:45 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:45 np0005557561.novalocal sudo[98784]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:45 np0005557561.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Dec 12 13:34:45 np0005557561.novalocal sudo[98788]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf c3KTncpPn99EDS6ECTpA y8xzG4a7tyGYy3b3 False -p3260 -a::1 Dec 12 13:34:45 np0005557561.novalocal systemd[1]: Started Session c174 of User root. Dec 12 13:34:45 np0005557561.novalocal sudo[98788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:46 np0005557561.novalocal sudo[98788]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:46 np0005557561.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Dec 12 13:34:46 np0005557561.novalocal sudo[98794]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:34:46 np0005557561.novalocal systemd[1]: Started Session c175 of User root. Dec 12 13:34:46 np0005557561.novalocal sudo[98794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:46 np0005557561.novalocal sudo[98794]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:46 np0005557561.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Dec 12 13:34:46 np0005557561.novalocal sudo[98799]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:46 np0005557561.novalocal systemd[1]: Started Session c176 of User root. Dec 12 13:34:46 np0005557561.novalocal sudo[98799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:47 np0005557561.novalocal sudo[98799]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:47 np0005557561.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Dec 12 13:34:47 np0005557561.novalocal sudo[98804]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf c3KTncpPn99EDS6ECTpA y8xzG4a7tyGYy3b3 iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:34:47 np0005557561.novalocal systemd[1]: Started Session c177 of User root. Dec 12 13:34:47 np0005557561.novalocal sudo[98804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:47 np0005557561.novalocal sudo[98804]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:47 np0005557561.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Dec 12 13:34:47 np0005557561.novalocal sudo[98810]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:47 np0005557561.novalocal systemd[1]: Started Session c178 of User root. Dec 12 13:34:47 np0005557561.novalocal sudo[98810]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:48 np0005557561.novalocal sudo[98810]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:48 np0005557561.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:34:48 np0005557561.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Dec 12 13:34:48 np0005557561.novalocal iscsid[74102]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf, portal: ::1,3260] through [iface: default] is operational now Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:34:48 np0005557561.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Dec 12 13:34:48 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Dec 12 13:34:48 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140574800f01ff2d41c8965467fb4 port group 0 rel port 1 Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Dec 12 13:34:48 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Dec 12 13:34:48 np0005557561.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Dec 12 13:34:48 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l e5874bb7-bdf7-462d-85e7-004873af941f Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:48 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l f1f203e9-efe8-4c29-b50d-418f61145b52 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 553e53f7-007a-4626-b1e7-df9c08c3c0e7 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 18de36e7-422b-4e0b-b1b4-bac754acfd4a Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l b43d10c9-ad90-47c1-9fa7-f804543c98d5 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:49 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 775da861-f40d-4a03-b318-3b617fa21098 Dec 12 13:34:49 np0005557561.novalocal sudo[98862]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Dec 12 13:34:49 np0005557561.novalocal systemd[1]: Started Session c179 of User root. Dec 12 13:34:50 np0005557561.novalocal sudo[98862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l d458f633-16a0-4782-bdae-f5f2ed64d219 Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 8cd54f3e-40ef-4463-8af1-68f42ca3d9aa Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 86104987-dff1-41ea-ba76-9ec67dc48fbc Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l ea7a77f2-cb5e-49c2-bd6a-10ce6102e10a Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 3076a216-a798-49e8-ad9c-02c6231e7736 Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 0a47c81c-4a5e-4e4c-bb75-b70e67b86d3a Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l a0060ab6-b7e7-4628-8eb2-8dea9cbb22fa Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 41867ef8-0455-4582-89f8-b834743ea318 Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l bd25425e-5eaa-448f-a214-d2842eca5231 Dec 12 13:34:50 np0005557561.novalocal sudo[98862]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:50 np0005557561.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Dec 12 13:34:50 np0005557561.novalocal sudo[98869]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Dec 12 13:34:50 np0005557561.novalocal systemd[1]: Started Session c180 of User root. Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 08f00acd-e836-450f-9dd8-d3d13a91663d Dec 12 13:34:50 np0005557561.novalocal sudo[98869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5fd3e619-169c-480e-9848-e421203ff16a Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 5040c47e-86e6-439b-a701-974827eac41c Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Dec 12 13:34:50 np0005557561.novalocal sudo[98869]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:50 np0005557561.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l e18a9621-69cd-4ed5-a346-4c5e1c059c48 Dec 12 13:34:50 np0005557561.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Dec 12 13:34:50 np0005557561.novalocal kernel: scsi 2:0:0:0: alua: Detached Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:50 np0005557561.novalocal iscsid[74102]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf, portal: ::1,3260] through [iface: default] is shutdown. Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 068cc45b-743f-469d-97cd-38f653a0894d Dec 12 13:34:50 np0005557561.novalocal sudo[98910]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf iqn.1994-05.com.redhat:21eb375f4b6e Dec 12 13:34:50 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:50 np0005557561.novalocal systemd[1]: Started Session c181 of User root. Dec 12 13:34:50 np0005557561.novalocal sudo[98910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 7bcaeab7-ce01-4a9a-b529-8b8b10463fe6 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 31f4430c-0467-4a4f-9a1c-b96158d137e8 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 9f7015cc-33da-4e91-ac90-f493b23e7d07 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c9dcf620-ea39-4a28-a4f3-0b735403ad42 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f11b89f4-42ad-4c5a-8d9c-c7c819242124 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 6e930967-076a-4ac6-bac0-fb07bcb46911 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l 19afb3b4-abef-4a29-8bba-b8f1866f2b79 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l e43cb037-592a-42a8-a5cd-4cb378e71678 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. For complete SELinux messages run: sealert -l aecdbd00-c7e7-4523-96ca-50c596f7b2c0 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 2b63c64b-5ef1-45d8-97a8-45acb6d30cdf Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l e4704486-3cdc-4e1d-999a-72bf1bd953a5 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 7d5daa21-884f-40f2-98aa-e278f962c13d Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l aec1e6a0-1913-4848-b8f0-384b09f396ec Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. For complete SELinux messages run: sealert -l 1219ab8e-aac7-4b92-91d2-a874d150b18a Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l f5d5cdbc-f9bb-40ef-b3f7-c3304e8e4c4e Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 540e61fc-5554-43ec-b173-135c94ec20a2 Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. For complete SELinux messages run: sealert -l 327f2e14-33a5-4557-b7a7-200df3637fbf Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l a03d6976-884f-4d9e-a3e2-3e70c04d017d Dec 12 13:34:51 np0005557561.novalocal setroubleshoot[98532]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Dec 12 13:34:51 np0005557561.novalocal sudo[98910]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:51 np0005557561.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Dec 12 13:34:51 np0005557561.novalocal sudo[98921]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:51 np0005557561.novalocal systemd[1]: Started Session c182 of User root. Dec 12 13:34:51 np0005557561.novalocal sudo[98921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:52 np0005557561.novalocal sudo[98921]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:52 np0005557561.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Dec 12 13:34:52 np0005557561.novalocal sudo[98926]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:34:52 np0005557561.novalocal systemd[1]: Started Session c183 of User root. Dec 12 13:34:52 np0005557561.novalocal sudo[98926]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:52 np0005557561.novalocal sudo[98926]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:52 np0005557561.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Dec 12 13:34:52 np0005557561.novalocal sudo[98931]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:52 np0005557561.novalocal systemd[1]: Started Session c184 of User root. Dec 12 13:34:52 np0005557561.novalocal sudo[98931]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:53 np0005557561.novalocal sudo[98931]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:53 np0005557561.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Dec 12 13:34:53 np0005557561.novalocal sudo[98936]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Dec 12 13:34:53 np0005557561.novalocal systemd[1]: Started Session c185 of User root. Dec 12 13:34:53 np0005557561.novalocal sudo[98936]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:53 np0005557561.novalocal sudo[98936]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:53 np0005557561.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Dec 12 13:34:56 np0005557561.novalocal sudo[98941]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Dec 12 13:34:56 np0005557561.novalocal systemd[1]: Started Session c186 of User root. Dec 12 13:34:56 np0005557561.novalocal sudo[98941]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:56 np0005557561.novalocal sudo[98941]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:56 np0005557561.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Dec 12 13:34:56 np0005557561.novalocal sudo[98946]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:56 np0005557561.novalocal systemd[1]: Started Session c187 of User root. Dec 12 13:34:56 np0005557561.novalocal sudo[98946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:57 np0005557561.novalocal sudo[98946]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:57 np0005557561.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Dec 12 13:34:57 np0005557561.novalocal sudo[98950]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:57 np0005557561.novalocal systemd[1]: Started Session c188 of User root. Dec 12 13:34:57 np0005557561.novalocal sudo[98950]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:57 np0005557561.novalocal sudo[98950]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:57 np0005557561.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Dec 12 13:34:57 np0005557561.novalocal sudo[98954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-2f83a8ef-ab39-4c28-a310-f44285e062cf Dec 12 13:34:57 np0005557561.novalocal systemd[1]: Started Session c189 of User root. Dec 12 13:34:57 np0005557561.novalocal sudo[98954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:57 np0005557561.novalocal lvm[98961]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:34:57 np0005557561.novalocal lvm[98961]: VG cinder-volumes finished Dec 12 13:34:58 np0005557561.novalocal sudo[98954]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:58 np0005557561.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Dec 12 13:34:58 np0005557561.novalocal sudo[98962]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:34:58 np0005557561.novalocal systemd[1]: Started Session c190 of User root. Dec 12 13:34:58 np0005557561.novalocal sudo[98962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:58 np0005557561.novalocal sudo[98962]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:58 np0005557561.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Dec 12 13:34:58 np0005557561.novalocal sudo[98966]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:34:58 np0005557561.novalocal systemd[1]: Started Session c191 of User root. Dec 12 13:34:58 np0005557561.novalocal sudo[98966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:58 np0005557561.novalocal sudo[98966]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:58 np0005557561.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Dec 12 13:34:58 np0005557561.novalocal sudo[98970]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:34:58 np0005557561.novalocal systemd[1]: Started Session c192 of User root. Dec 12 13:34:58 np0005557561.novalocal sudo[98970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:59 np0005557561.novalocal sudo[98970]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:59 np0005557561.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Dec 12 13:34:59 np0005557561.novalocal sudo[98974]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:34:59 np0005557561.novalocal systemd[1]: Started Session c193 of User root. Dec 12 13:34:59 np0005557561.novalocal sudo[98974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:34:59 np0005557561.novalocal sudo[98974]: pam_unix(sudo:session): session closed for user root Dec 12 13:34:59 np0005557561.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.231s CPU time. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:35:01 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:35:01 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 5.835s CPU time. Dec 12 13:35:08 np0005557561.novalocal sudo[98987]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:35:08 np0005557561.novalocal systemd[1]: Started Session c194 of User root. Dec 12 13:35:08 np0005557561.novalocal sudo[98987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:35:09 np0005557561.novalocal sudo[98987]: pam_unix(sudo:session): session closed for user root Dec 12 13:35:09 np0005557561.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Dec 12 13:35:09 np0005557561.novalocal sudo[98991]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:35:09 np0005557561.novalocal systemd[1]: Started Session c195 of User root. Dec 12 13:35:09 np0005557561.novalocal sudo[98991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:35:09 np0005557561.novalocal sudo[98991]: pam_unix(sudo:session): session closed for user root Dec 12 13:35:09 np0005557561.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Dec 12 13:35:09 np0005557561.novalocal sudo[98995]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:35:09 np0005557561.novalocal systemd[1]: Started Session c196 of User root. Dec 12 13:35:09 np0005557561.novalocal sudo[98995]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:35:09 np0005557561.novalocal sudo[98995]: pam_unix(sudo:session): session closed for user root Dec 12 13:35:09 np0005557561.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Dec 12 13:35:09 np0005557561.novalocal sudo[98999]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:35:10 np0005557561.novalocal systemd[1]: Started Session c197 of User root. Dec 12 13:35:10 np0005557561.novalocal sudo[98999]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:35:10 np0005557561.novalocal sudo[98999]: pam_unix(sudo:session): session closed for user root Dec 12 13:35:10 np0005557561.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Dec 12 13:35:23 np0005557561.novalocal sshd-session[99013]: Connection closed by authenticating user root 167.71.2.158 port 46652 [preauth] Dec 12 13:36:02 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:36:02 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:36:02 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:36:08 np0005557561.novalocal sudo[99092]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:08 np0005557561.novalocal systemd[1]: Started Session c198 of User root. Dec 12 13:36:08 np0005557561.novalocal sudo[99092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:09 np0005557561.novalocal sudo[99092]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:09 np0005557561.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Dec 12 13:36:09 np0005557561.novalocal sudo[99098]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:09 np0005557561.novalocal systemd[1]: Started Session c199 of User root. Dec 12 13:36:09 np0005557561.novalocal sudo[99098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:09 np0005557561.novalocal sshd-session[99095]: Connection closed by authenticating user root 167.71.2.158 port 36354 [preauth] Dec 12 13:36:09 np0005557561.novalocal sudo[99098]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:09 np0005557561.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Dec 12 13:36:09 np0005557561.novalocal sudo[99102]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:09 np0005557561.novalocal systemd[1]: Started Session c200 of User root. Dec 12 13:36:09 np0005557561.novalocal sudo[99102]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:10 np0005557561.novalocal sudo[99102]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:10 np0005557561.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Dec 12 13:36:10 np0005557561.novalocal sudo[99106]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:10 np0005557561.novalocal systemd[1]: Started Session c201 of User root. Dec 12 13:36:10 np0005557561.novalocal sudo[99106]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:10 np0005557561.novalocal sudo[99106]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:10 np0005557561.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Dec 12 13:36:22 np0005557561.novalocal sudo[99117]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-c71bef4e-1c12-41d3-9721-8fb387e8ed13 cinder-volumes/cinder-volumes-pool Dec 12 13:36:22 np0005557561.novalocal systemd[1]: Started Session c202 of User root. Dec 12 13:36:22 np0005557561.novalocal sudo[99117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:22 np0005557561.novalocal lvm[99128]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:22 np0005557561.novalocal lvm[99128]: VG cinder-volumes finished Dec 12 13:36:22 np0005557561.novalocal sudo[99117]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:22 np0005557561.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Dec 12 13:36:24 np0005557561.novalocal sudo[99130]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-8828953e-682a-4135-b445-df53ca4c6071 cinder-volumes/cinder-volumes-pool Dec 12 13:36:24 np0005557561.novalocal systemd[1]: Started Session c203 of User root. Dec 12 13:36:24 np0005557561.novalocal sudo[99130]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:24 np0005557561.novalocal lvm[99140]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:24 np0005557561.novalocal lvm[99140]: VG cinder-volumes finished Dec 12 13:36:24 np0005557561.novalocal sudo[99130]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:24 np0005557561.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Dec 12 13:36:25 np0005557561.novalocal sudo[99141]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-8828953e-682a-4135-b445-df53ca4c6071 Dec 12 13:36:25 np0005557561.novalocal systemd[1]: Started Session c204 of User root. Dec 12 13:36:25 np0005557561.novalocal sudo[99141]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:25 np0005557561.novalocal sudo[99141]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:25 np0005557561.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Dec 12 13:36:25 np0005557561.novalocal sudo[99145]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-8828953e-682a-4135-b445-df53ca4c6071 Dec 12 13:36:25 np0005557561.novalocal systemd[1]: Started Session c205 of User root. Dec 12 13:36:25 np0005557561.novalocal sudo[99145]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:26 np0005557561.novalocal sudo[99145]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:26 np0005557561.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Dec 12 13:36:26 np0005557561.novalocal sudo[99150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-8828953e-682a-4135-b445-df53ca4c6071 Dec 12 13:36:26 np0005557561.novalocal systemd[1]: Started Session c206 of User root. Dec 12 13:36:26 np0005557561.novalocal sudo[99150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:26 np0005557561.novalocal lvm[99158]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:26 np0005557561.novalocal lvm[99158]: VG cinder-volumes finished Dec 12 13:36:26 np0005557561.novalocal sudo[99150]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:26 np0005557561.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Dec 12 13:36:26 np0005557561.novalocal sudo[99159]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:26 np0005557561.novalocal systemd[1]: Started Session c207 of User root. Dec 12 13:36:26 np0005557561.novalocal sudo[99159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:27 np0005557561.novalocal sudo[99159]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:27 np0005557561.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Dec 12 13:36:27 np0005557561.novalocal sudo[99163]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:27 np0005557561.novalocal systemd[1]: Started Session c208 of User root. Dec 12 13:36:27 np0005557561.novalocal sudo[99163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:27 np0005557561.novalocal sudo[99167]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-c71bef4e-1c12-41d3-9721-8fb387e8ed13 Dec 12 13:36:27 np0005557561.novalocal systemd[1]: Started Session c209 of User root. Dec 12 13:36:27 np0005557561.novalocal sudo[99167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:27 np0005557561.novalocal sudo[99163]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:27 np0005557561.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Dec 12 13:36:27 np0005557561.novalocal sudo[99170]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:27 np0005557561.novalocal systemd[1]: Started Session c210 of User root. Dec 12 13:36:27 np0005557561.novalocal sudo[99170]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:28 np0005557561.novalocal sudo[99167]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:28 np0005557561.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Dec 12 13:36:28 np0005557561.novalocal sudo[99175]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-c71bef4e-1c12-41d3-9721-8fb387e8ed13 Dec 12 13:36:28 np0005557561.novalocal systemd[1]: Started Session c211 of User root. Dec 12 13:36:28 np0005557561.novalocal sudo[99175]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:28 np0005557561.novalocal sudo[99170]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:28 np0005557561.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Dec 12 13:36:28 np0005557561.novalocal sudo[99179]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:28 np0005557561.novalocal systemd[1]: Started Session c212 of User root. Dec 12 13:36:28 np0005557561.novalocal sudo[99179]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:28 np0005557561.novalocal sudo[99175]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:28 np0005557561.novalocal sudo[99179]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:28 np0005557561.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Dec 12 13:36:28 np0005557561.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Dec 12 13:36:28 np0005557561.novalocal sudo[99184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-c71bef4e-1c12-41d3-9721-8fb387e8ed13 Dec 12 13:36:28 np0005557561.novalocal systemd[1]: Started Session c213 of User root. Dec 12 13:36:28 np0005557561.novalocal sudo[99184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:28 np0005557561.novalocal lvm[99189]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:28 np0005557561.novalocal lvm[99189]: VG cinder-volumes finished Dec 12 13:36:28 np0005557561.novalocal sudo[99184]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:28 np0005557561.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Dec 12 13:36:29 np0005557561.novalocal sudo[99190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:29 np0005557561.novalocal systemd[1]: Started Session c214 of User root. Dec 12 13:36:29 np0005557561.novalocal sudo[99190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:29 np0005557561.novalocal sudo[99190]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:29 np0005557561.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Dec 12 13:36:29 np0005557561.novalocal sudo[99195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:29 np0005557561.novalocal systemd[1]: Started Session c215 of User root. Dec 12 13:36:29 np0005557561.novalocal sudo[99195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:29 np0005557561.novalocal sudo[99195]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:29 np0005557561.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Dec 12 13:36:30 np0005557561.novalocal sudo[99199]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:30 np0005557561.novalocal systemd[1]: Started Session c216 of User root. Dec 12 13:36:30 np0005557561.novalocal sudo[99199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:30 np0005557561.novalocal sudo[99199]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:30 np0005557561.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Dec 12 13:36:30 np0005557561.novalocal sudo[99204]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:30 np0005557561.novalocal systemd[1]: Started Session c217 of User root. Dec 12 13:36:30 np0005557561.novalocal sudo[99204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:30 np0005557561.novalocal sudo[99204]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:30 np0005557561.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Dec 12 13:36:30 np0005557561.novalocal sudo[99208]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:36:30 np0005557561.novalocal systemd[1]: Started Session c218 of User root. Dec 12 13:36:30 np0005557561.novalocal sudo[99208]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:31 np0005557561.novalocal sudo[99208]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:31 np0005557561.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Dec 12 13:36:31 np0005557561.novalocal sudo[99214]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-ee837b59-a719-44a2-a07b-163432e4546a --snapshot cinder-volumes/volume-c30100c1-8599-4b3c-8f85-0de2d5a37fd8 Dec 12 13:36:31 np0005557561.novalocal systemd[1]: Started Session c219 of User root. Dec 12 13:36:31 np0005557561.novalocal sudo[99214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:31 np0005557561.novalocal dmeventd[88898]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 12 13:36:31 np0005557561.novalocal dmeventd[88898]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Dec 12 13:36:31 np0005557561.novalocal lvm[99224]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:31 np0005557561.novalocal lvm[99224]: VG cinder-volumes finished Dec 12 13:36:31 np0005557561.novalocal sudo[99214]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:31 np0005557561.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Dec 12 13:36:31 np0005557561.novalocal sudo[99225]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-ee837b59-a719-44a2-a07b-163432e4546a Dec 12 13:36:31 np0005557561.novalocal systemd[1]: Started Session c220 of User root. Dec 12 13:36:31 np0005557561.novalocal sudo[99225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:32 np0005557561.novalocal lvm[99230]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:32 np0005557561.novalocal lvm[99230]: VG cinder-volumes finished Dec 12 13:36:32 np0005557561.novalocal sudo[99225]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:32 np0005557561.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Dec 12 13:36:33 np0005557561.novalocal sudo[99237]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9dd3ad78-a6c1-4f8b-985c-a90587f7505a cinder-volumes/cinder-volumes-pool Dec 12 13:36:33 np0005557561.novalocal systemd[1]: Started Session c221 of User root. Dec 12 13:36:33 np0005557561.novalocal sudo[99237]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:33 np0005557561.novalocal lvm[99246]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:33 np0005557561.novalocal lvm[99246]: VG cinder-volumes finished Dec 12 13:36:34 np0005557561.novalocal sudo[99237]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:34 np0005557561.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Dec 12 13:36:34 np0005557561.novalocal sudo[99247]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9dd3ad78-a6c1-4f8b-985c-a90587f7505a Dec 12 13:36:34 np0005557561.novalocal systemd[1]: Started Session c222 of User root. Dec 12 13:36:34 np0005557561.novalocal sudo[99247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:35 np0005557561.novalocal sudo[99247]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:35 np0005557561.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Dec 12 13:36:35 np0005557561.novalocal sudo[99251]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9dd3ad78-a6c1-4f8b-985c-a90587f7505a Dec 12 13:36:35 np0005557561.novalocal systemd[1]: Started Session c223 of User root. Dec 12 13:36:35 np0005557561.novalocal sudo[99251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:35 np0005557561.novalocal sudo[99251]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:35 np0005557561.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Dec 12 13:36:35 np0005557561.novalocal sudo[99256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9dd3ad78-a6c1-4f8b-985c-a90587f7505a Dec 12 13:36:35 np0005557561.novalocal systemd[1]: Started Session c224 of User root. Dec 12 13:36:35 np0005557561.novalocal sudo[99256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:35 np0005557561.novalocal lvm[99263]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:35 np0005557561.novalocal lvm[99263]: VG cinder-volumes finished Dec 12 13:36:36 np0005557561.novalocal sudo[99256]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:36 np0005557561.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Dec 12 13:36:36 np0005557561.novalocal sudo[99264]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:36 np0005557561.novalocal systemd[1]: Started Session c225 of User root. Dec 12 13:36:36 np0005557561.novalocal sudo[99264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:36 np0005557561.novalocal sudo[99264]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:36 np0005557561.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Dec 12 13:36:36 np0005557561.novalocal sudo[99269]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:36 np0005557561.novalocal systemd[1]: Started Session c226 of User root. Dec 12 13:36:36 np0005557561.novalocal sudo[99269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:36 np0005557561.novalocal sudo[99273]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-ee837b59-a719-44a2-a07b-163432e4546a Dec 12 13:36:36 np0005557561.novalocal systemd[1]: Started Session c227 of User root. Dec 12 13:36:36 np0005557561.novalocal sudo[99273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:36 np0005557561.novalocal sudo[99269]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:36 np0005557561.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Dec 12 13:36:36 np0005557561.novalocal sudo[99276]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:37 np0005557561.novalocal systemd[1]: Started Session c228 of User root. Dec 12 13:36:37 np0005557561.novalocal sudo[99276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:37 np0005557561.novalocal sudo[99273]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:37 np0005557561.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Dec 12 13:36:37 np0005557561.novalocal sudo[99280]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-ee837b59-a719-44a2-a07b-163432e4546a Dec 12 13:36:37 np0005557561.novalocal systemd[1]: Started Session c229 of User root. Dec 12 13:36:37 np0005557561.novalocal sudo[99280]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:37 np0005557561.novalocal sudo[99276]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:37 np0005557561.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Dec 12 13:36:37 np0005557561.novalocal sudo[99284]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:37 np0005557561.novalocal systemd[1]: Started Session c230 of User root. Dec 12 13:36:37 np0005557561.novalocal sudo[99284]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:37 np0005557561.novalocal sudo[99280]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:37 np0005557561.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Dec 12 13:36:37 np0005557561.novalocal sudo[99288]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-ee837b59-a719-44a2-a07b-163432e4546a Dec 12 13:36:37 np0005557561.novalocal systemd[1]: Started Session c231 of User root. Dec 12 13:36:37 np0005557561.novalocal sudo[99288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:37 np0005557561.novalocal sudo[99284]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:37 np0005557561.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Dec 12 13:36:38 np0005557561.novalocal lvm[99294]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:38 np0005557561.novalocal lvm[99294]: VG cinder-volumes finished Dec 12 13:36:38 np0005557561.novalocal sudo[99288]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:38 np0005557561.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Dec 12 13:36:38 np0005557561.novalocal sudo[99295]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:38 np0005557561.novalocal systemd[1]: Started Session c232 of User root. Dec 12 13:36:38 np0005557561.novalocal sudo[99295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:38 np0005557561.novalocal sudo[99295]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:38 np0005557561.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Dec 12 13:36:38 np0005557561.novalocal sudo[99299]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:38 np0005557561.novalocal systemd[1]: Started Session c233 of User root. Dec 12 13:36:38 np0005557561.novalocal sudo[99299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:39 np0005557561.novalocal sudo[99299]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:39 np0005557561.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Dec 12 13:36:39 np0005557561.novalocal sudo[99303]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:39 np0005557561.novalocal systemd[1]: Started Session c234 of User root. Dec 12 13:36:39 np0005557561.novalocal sudo[99303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:39 np0005557561.novalocal sudo[99303]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:39 np0005557561.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Dec 12 13:36:39 np0005557561.novalocal sudo[99307]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:39 np0005557561.novalocal systemd[1]: Started Session c235 of User root. Dec 12 13:36:39 np0005557561.novalocal sudo[99307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:39 np0005557561.novalocal sudo[99307]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:39 np0005557561.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Dec 12 13:36:42 np0005557561.novalocal sudo[99313]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6f0b58f7-a529-4a89-b0bc-cbd9af685459 cinder-volumes/cinder-volumes-pool Dec 12 13:36:42 np0005557561.novalocal systemd[1]: Started Session c236 of User root. Dec 12 13:36:42 np0005557561.novalocal sudo[99313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:42 np0005557561.novalocal lvm[99324]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:42 np0005557561.novalocal lvm[99324]: VG cinder-volumes finished Dec 12 13:36:43 np0005557561.novalocal sudo[99313]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:43 np0005557561.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Dec 12 13:36:43 np0005557561.novalocal sudo[99362]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-16255353-84c1-463c-b299-66e36fa0a3b0 cinder-volumes/cinder-volumes-pool Dec 12 13:36:43 np0005557561.novalocal systemd[1]: Started Session c237 of User root. Dec 12 13:36:43 np0005557561.novalocal sudo[99362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:44 np0005557561.novalocal lvm[99371]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:44 np0005557561.novalocal lvm[99371]: VG cinder-volumes finished Dec 12 13:36:44 np0005557561.novalocal sudo[99362]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:44 np0005557561.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Dec 12 13:36:45 np0005557561.novalocal sudo[99372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-33179b29-8276-497e-bfb2-060aa1989d43 cinder-volumes/cinder-volumes-pool Dec 12 13:36:45 np0005557561.novalocal systemd[1]: Started Session c238 of User root. Dec 12 13:36:45 np0005557561.novalocal sudo[99372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:45 np0005557561.novalocal lvm[99381]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:45 np0005557561.novalocal lvm[99381]: VG cinder-volumes finished Dec 12 13:36:45 np0005557561.novalocal sudo[99372]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:45 np0005557561.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Dec 12 13:36:46 np0005557561.novalocal sudo[99382]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-33179b29-8276-497e-bfb2-060aa1989d43 Dec 12 13:36:46 np0005557561.novalocal systemd[1]: Started Session c239 of User root. Dec 12 13:36:46 np0005557561.novalocal sudo[99382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:46 np0005557561.novalocal sudo[99382]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:46 np0005557561.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Dec 12 13:36:46 np0005557561.novalocal sudo[99386]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-33179b29-8276-497e-bfb2-060aa1989d43 Dec 12 13:36:46 np0005557561.novalocal systemd[1]: Started Session c240 of User root. Dec 12 13:36:46 np0005557561.novalocal sudo[99386]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:47 np0005557561.novalocal sudo[99386]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:47 np0005557561.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Dec 12 13:36:47 np0005557561.novalocal sudo[99390]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-33179b29-8276-497e-bfb2-060aa1989d43 Dec 12 13:36:47 np0005557561.novalocal systemd[1]: Started Session c241 of User root. Dec 12 13:36:47 np0005557561.novalocal sudo[99390]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:47 np0005557561.novalocal lvm[99397]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:47 np0005557561.novalocal lvm[99397]: VG cinder-volumes finished Dec 12 13:36:47 np0005557561.novalocal sudo[99390]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:47 np0005557561.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Dec 12 13:36:47 np0005557561.novalocal sudo[99399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:47 np0005557561.novalocal systemd[1]: Started Session c242 of User root. Dec 12 13:36:47 np0005557561.novalocal sudo[99399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:48 np0005557561.novalocal sudo[99399]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:48 np0005557561.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Dec 12 13:36:48 np0005557561.novalocal sudo[99403]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:48 np0005557561.novalocal systemd[1]: Started Session c243 of User root. Dec 12 13:36:48 np0005557561.novalocal sudo[99403]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:48 np0005557561.novalocal sudo[99403]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:48 np0005557561.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Dec 12 13:36:48 np0005557561.novalocal sudo[99407]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:48 np0005557561.novalocal systemd[1]: Started Session c244 of User root. Dec 12 13:36:48 np0005557561.novalocal sudo[99407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:48 np0005557561.novalocal sudo[99410]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-16255353-84c1-463c-b299-66e36fa0a3b0 Dec 12 13:36:48 np0005557561.novalocal systemd[1]: Started Session c245 of User root. Dec 12 13:36:48 np0005557561.novalocal sudo[99410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:49 np0005557561.novalocal sudo[99407]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:49 np0005557561.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Dec 12 13:36:49 np0005557561.novalocal sudo[99415]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:49 np0005557561.novalocal systemd[1]: Started Session c246 of User root. Dec 12 13:36:49 np0005557561.novalocal sudo[99415]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:49 np0005557561.novalocal sudo[99410]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:49 np0005557561.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Dec 12 13:36:49 np0005557561.novalocal sudo[99418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-16255353-84c1-463c-b299-66e36fa0a3b0 Dec 12 13:36:49 np0005557561.novalocal systemd[1]: Started Session c247 of User root. Dec 12 13:36:49 np0005557561.novalocal sudo[99418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:49 np0005557561.novalocal sudo[99415]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:49 np0005557561.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Dec 12 13:36:49 np0005557561.novalocal sudo[99418]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:49 np0005557561.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Dec 12 13:36:49 np0005557561.novalocal sudo[99423]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-16255353-84c1-463c-b299-66e36fa0a3b0 Dec 12 13:36:49 np0005557561.novalocal systemd[1]: Started Session c248 of User root. Dec 12 13:36:49 np0005557561.novalocal sudo[99423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:50 np0005557561.novalocal lvm[99428]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:50 np0005557561.novalocal lvm[99428]: VG cinder-volumes finished Dec 12 13:36:50 np0005557561.novalocal sudo[99423]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:50 np0005557561.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Dec 12 13:36:50 np0005557561.novalocal sudo[99429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:50 np0005557561.novalocal systemd[1]: Started Session c249 of User root. Dec 12 13:36:50 np0005557561.novalocal sudo[99429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:50 np0005557561.novalocal sudo[99429]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:50 np0005557561.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Dec 12 13:36:50 np0005557561.novalocal sudo[99433]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:50 np0005557561.novalocal systemd[1]: Started Session c250 of User root. Dec 12 13:36:50 np0005557561.novalocal sudo[99433]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:50 np0005557561.novalocal sudo[99433]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:51 np0005557561.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Dec 12 13:36:51 np0005557561.novalocal sudo[99437]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6f0b58f7-a529-4a89-b0bc-cbd9af685459 Dec 12 13:36:51 np0005557561.novalocal systemd[1]: Started Session c251 of User root. Dec 12 13:36:51 np0005557561.novalocal sudo[99437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:51 np0005557561.novalocal sudo[99439]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:51 np0005557561.novalocal systemd[1]: Started Session c252 of User root. Dec 12 13:36:51 np0005557561.novalocal sudo[99439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:51 np0005557561.novalocal sudo[99437]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:51 np0005557561.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Dec 12 13:36:51 np0005557561.novalocal sudo[99445]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6f0b58f7-a529-4a89-b0bc-cbd9af685459 Dec 12 13:36:51 np0005557561.novalocal systemd[1]: Started Session c253 of User root. Dec 12 13:36:51 np0005557561.novalocal sudo[99445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:51 np0005557561.novalocal sudo[99439]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:51 np0005557561.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Dec 12 13:36:51 np0005557561.novalocal sudo[99450]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:51 np0005557561.novalocal systemd[1]: Started Session c254 of User root. Dec 12 13:36:51 np0005557561.novalocal sudo[99450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:51 np0005557561.novalocal sudo[99445]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:51 np0005557561.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Dec 12 13:36:51 np0005557561.novalocal sudo[99455]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6f0b58f7-a529-4a89-b0bc-cbd9af685459 Dec 12 13:36:51 np0005557561.novalocal sudo[99450]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:51 np0005557561.novalocal systemd[1]: Started Session c255 of User root. Dec 12 13:36:51 np0005557561.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Dec 12 13:36:51 np0005557561.novalocal sudo[99455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:52 np0005557561.novalocal lvm[99462]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:52 np0005557561.novalocal lvm[99462]: VG cinder-volumes finished Dec 12 13:36:52 np0005557561.novalocal sudo[99455]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:52 np0005557561.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Dec 12 13:36:52 np0005557561.novalocal sudo[99463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:36:52 np0005557561.novalocal systemd[1]: Started Session c256 of User root. Dec 12 13:36:52 np0005557561.novalocal sudo[99463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:52 np0005557561.novalocal sudo[99463]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:52 np0005557561.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Dec 12 13:36:52 np0005557561.novalocal sudo[99467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:52 np0005557561.novalocal systemd[1]: Started Session c257 of User root. Dec 12 13:36:52 np0005557561.novalocal sudo[99467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:53 np0005557561.novalocal sudo[99467]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:53 np0005557561.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Dec 12 13:36:53 np0005557561.novalocal sudo[99471]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:36:53 np0005557561.novalocal systemd[1]: Started Session c258 of User root. Dec 12 13:36:53 np0005557561.novalocal sudo[99471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:53 np0005557561.novalocal sudo[99471]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:53 np0005557561.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Dec 12 13:36:53 np0005557561.novalocal sudo[99476]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:36:53 np0005557561.novalocal systemd[1]: Started Session c259 of User root. Dec 12 13:36:53 np0005557561.novalocal sudo[99476]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:54 np0005557561.novalocal sudo[99476]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:54 np0005557561.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Dec 12 13:36:56 np0005557561.novalocal sudo[99485]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6f2ce6a5-e309-49d6-be7b-e02aceb4bf33 cinder-volumes/cinder-volumes-pool Dec 12 13:36:56 np0005557561.novalocal systemd[1]: Started Session c260 of User root. Dec 12 13:36:56 np0005557561.novalocal sudo[99485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:36:57 np0005557561.novalocal sshd-session[99481]: Connection closed by authenticating user root 167.71.2.158 port 45536 [preauth] Dec 12 13:36:57 np0005557561.novalocal lvm[99496]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:36:57 np0005557561.novalocal lvm[99496]: VG cinder-volumes finished Dec 12 13:36:57 np0005557561.novalocal sudo[99485]: pam_unix(sudo:session): session closed for user root Dec 12 13:36:57 np0005557561.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Dec 12 13:37:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:37:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:37:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:37:08 np0005557561.novalocal kernel: tap6b5c0077-3c: entered promiscuous mode Dec 12 13:37:08 np0005557561.novalocal NetworkManager[858]: [1765564628.5524] manager: (tap6b5c0077-3c): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Dec 12 13:37:08 np0005557561.novalocal virtqemud[93658]: Domain id=9 name='instance-00000008' uuid=fd2b938f-a085-45d6-a2af-4d2ef4414fb4 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:37:08 np0005557561.novalocal virtqemud[93658]: Domain id=9 name='instance-00000008' uuid=fd2b938f-a085-45d6-a2af-4d2ef4414fb4 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:37:08 np0005557561.novalocal systemd-machined[90553]: New machine qemu-9-instance-00000008. Dec 12 13:37:08 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Dec 12 13:37:08 np0005557561.novalocal systemd-udevd[99568]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:37:08 np0005557561.novalocal NetworkManager[858]: [1765564628.6618] device (tap6b5c0077-3c): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:37:08 np0005557561.novalocal NetworkManager[858]: [1765564628.6625] device (tap6b5c0077-3c): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:37:08 np0005557561.novalocal NetworkManager[858]: [1765564628.6901] manager: (tap60093ece-c0): new Veth device (/org/freedesktop/NetworkManager/Devices/28) Dec 12 13:37:08 np0005557561.novalocal systemd-udevd[99574]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:37:08 np0005557561.novalocal NetworkManager[858]: [1765564628.7577] device (tap60093ece-c0): carrier: link connected Dec 12 13:37:08 np0005557561.novalocal sudo[99606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:37:08 np0005557561.novalocal systemd[1]: Started Session c261 of User root. Dec 12 13:37:08 np0005557561.novalocal sudo[99606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:08 np0005557561.novalocal kernel: tap60093ece-c0: entered promiscuous mode Dec 12 13:37:09 np0005557561.novalocal sudo[99615]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-60093ece-cd20-495a-b9e5-b4b8e3386fea env PROCESS_TAG=haproxy-60093ece-cd20-495a-b9e5-b4b8e3386fea haproxy -f /var/lib/neutron/ovn-metadata-proxy/60093ece-cd20-495a-b9e5-b4b8e3386fea.conf Dec 12 13:37:09 np0005557561.novalocal systemd[1]: Started Session c262 of User root. Dec 12 13:37:09 np0005557561.novalocal sudo[99615]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:37:09 np0005557561.novalocal sudo[99606]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:09 np0005557561.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Dec 12 13:37:09 np0005557561.novalocal sudo[99619]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:37:09 np0005557561.novalocal systemd[1]: Started Session c263 of User root. Dec 12 13:37:09 np0005557561.novalocal sudo[99619]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:09 np0005557561.novalocal sudo[99615]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:09 np0005557561.novalocal sudo[99619]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:09 np0005557561.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Dec 12 13:37:09 np0005557561.novalocal sudo[99634]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:37:09 np0005557561.novalocal systemd[1]: Started Session c264 of User root. Dec 12 13:37:09 np0005557561.novalocal sudo[99634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:10 np0005557561.novalocal sudo[99634]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:10 np0005557561.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Dec 12 13:37:10 np0005557561.novalocal sudo[99638]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:37:10 np0005557561.novalocal systemd[1]: Started Session c265 of User root. Dec 12 13:37:10 np0005557561.novalocal sudo[99638]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:10 np0005557561.novalocal sudo[99638]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:10 np0005557561.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Dec 12 13:37:22 np0005557561.novalocal kernel: tap6b5c0077-3c (unregistering): left promiscuous mode Dec 12 13:37:22 np0005557561.novalocal NetworkManager[858]: [1765564642.3410] device (tap6b5c0077-3c): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:37:22 np0005557561.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Dec 12 13:37:22 np0005557561.novalocal kernel: tap60093ece-c0: left promiscuous mode Dec 12 13:37:22 np0005557561.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Dec 12 13:37:22 np0005557561.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 11.321s CPU time. Dec 12 13:37:22 np0005557561.novalocal systemd-machined[90553]: Machine qemu-9-instance-00000008 terminated. Dec 12 13:37:22 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d60093ece\x2dcd20\x2d495a\x2db9e5\x2db4b8e3386fea.mount: Deactivated successfully. Dec 12 13:37:31 np0005557561.novalocal sudo[99736]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-6f2ce6a5-e309-49d6-be7b-e02aceb4bf33 Dec 12 13:37:31 np0005557561.novalocal systemd[1]: Started Session c266 of User root. Dec 12 13:37:31 np0005557561.novalocal sudo[99736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:32 np0005557561.novalocal sudo[99736]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:32 np0005557561.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Dec 12 13:37:32 np0005557561.novalocal sudo[99740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-6f2ce6a5-e309-49d6-be7b-e02aceb4bf33 Dec 12 13:37:32 np0005557561.novalocal systemd[1]: Started Session c267 of User root. Dec 12 13:37:32 np0005557561.novalocal sudo[99740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:32 np0005557561.novalocal sudo[99740]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:32 np0005557561.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Dec 12 13:37:32 np0005557561.novalocal sudo[99744]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-6f2ce6a5-e309-49d6-be7b-e02aceb4bf33 Dec 12 13:37:32 np0005557561.novalocal systemd[1]: Started Session c268 of User root. Dec 12 13:37:32 np0005557561.novalocal sudo[99744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:33 np0005557561.novalocal lvm[99751]: PV /dev/loop2 online, VG cinder-volumes is complete. Dec 12 13:37:33 np0005557561.novalocal lvm[99751]: VG cinder-volumes finished Dec 12 13:37:33 np0005557561.novalocal sudo[99744]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:33 np0005557561.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Dec 12 13:37:33 np0005557561.novalocal sudo[99752]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:37:33 np0005557561.novalocal systemd[1]: Started Session c269 of User root. Dec 12 13:37:33 np0005557561.novalocal sudo[99752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:33 np0005557561.novalocal sudo[99752]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:33 np0005557561.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Dec 12 13:37:33 np0005557561.novalocal sudo[99759]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:37:33 np0005557561.novalocal systemd[1]: Started Session c270 of User root. Dec 12 13:37:33 np0005557561.novalocal sudo[99759]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:33 np0005557561.novalocal kernel: tapd26edcbc-4a: entered promiscuous mode Dec 12 13:37:33 np0005557561.novalocal NetworkManager[858]: [1765564653.8980] manager: (tapd26edcbc-4a): new Tun device (/org/freedesktop/NetworkManager/Devices/29) Dec 12 13:37:33 np0005557561.novalocal systemd-udevd[99749]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:37:33 np0005557561.novalocal virtqemud[93658]: Domain id=10 name='instance-00000009' uuid=fe2683ee-21dc-4818-a3f5-582fbaf4f477 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:37:33 np0005557561.novalocal virtqemud[93658]: Domain id=10 name='instance-00000009' uuid=fe2683ee-21dc-4818-a3f5-582fbaf4f477 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:37:33 np0005557561.novalocal NetworkManager[858]: [1765564653.9349] device (tapd26edcbc-4a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:37:33 np0005557561.novalocal NetworkManager[858]: [1765564653.9359] device (tapd26edcbc-4a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:37:33 np0005557561.novalocal systemd-machined[90553]: New machine qemu-10-instance-00000009. Dec 12 13:37:33 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Dec 12 13:37:34 np0005557561.novalocal NetworkManager[858]: [1765564654.0207] manager: (tap114e61f5-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/30) Dec 12 13:37:34 np0005557561.novalocal NetworkManager[858]: [1765564654.0835] device (tap114e61f5-d0): carrier: link connected Dec 12 13:37:34 np0005557561.novalocal sudo[99759]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:34 np0005557561.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Dec 12 13:37:34 np0005557561.novalocal sudo[99821]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:37:34 np0005557561.novalocal kernel: tap114e61f5-d0: entered promiscuous mode Dec 12 13:37:34 np0005557561.novalocal systemd[1]: Started Session c271 of User root. Dec 12 13:37:34 np0005557561.novalocal sudo[99821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:34 np0005557561.novalocal sudo[99826]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-114e61f5-d9e6-44c4-8629-7e6b3c9e8ea3 env PROCESS_TAG=haproxy-114e61f5-d9e6-44c4-8629-7e6b3c9e8ea3 haproxy -f /var/lib/neutron/ovn-metadata-proxy/114e61f5-d9e6-44c4-8629-7e6b3c9e8ea3.conf Dec 12 13:37:34 np0005557561.novalocal systemd[1]: Started Session c272 of User root. Dec 12 13:37:34 np0005557561.novalocal sudo[99826]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:37:34 np0005557561.novalocal sudo[99821]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:34 np0005557561.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Dec 12 13:37:34 np0005557561.novalocal sudo[99841]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:37:34 np0005557561.novalocal sudo[99826]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:34 np0005557561.novalocal systemd[1]: Started Session c273 of User root. Dec 12 13:37:34 np0005557561.novalocal sudo[99841]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:37:34 np0005557561.novalocal sudo[99841]: pam_unix(sudo:session): session closed for user root Dec 12 13:37:34 np0005557561.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Dec 12 13:37:41 np0005557561.novalocal sshd-session[99847]: Connection closed by authenticating user root 167.71.2.158 port 40720 [preauth] Dec 12 13:37:57 np0005557561.novalocal kernel: tapb73ac4c8-e9: entered promiscuous mode Dec 12 13:37:57 np0005557561.novalocal NetworkManager[858]: [1765564677.6908] manager: (tapb73ac4c8-e9): new Tun device (/org/freedesktop/NetworkManager/Devices/31) Dec 12 13:37:57 np0005557561.novalocal virtqemud[93658]: Domain id=11 name='instance-0000000a' uuid=f50e3b49-7049-4144-b642-1b5f518d59c9 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:37:57 np0005557561.novalocal virtqemud[93658]: Domain id=11 name='instance-0000000a' uuid=f50e3b49-7049-4144-b642-1b5f518d59c9 is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:37:57 np0005557561.novalocal systemd-machined[90553]: New machine qemu-11-instance-0000000a. Dec 12 13:37:57 np0005557561.novalocal systemd-udevd[99942]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:37:57 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Dec 12 13:37:57 np0005557561.novalocal NetworkManager[858]: [1765564677.7913] device (tapb73ac4c8-e9): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:37:57 np0005557561.novalocal NetworkManager[858]: [1765564677.7919] device (tapb73ac4c8-e9): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:37:57 np0005557561.novalocal NetworkManager[858]: [1765564677.8274] manager: (tapb3b8d09b-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/32) Dec 12 13:37:57 np0005557561.novalocal NetworkManager[858]: [1765564677.8921] device (tapb3b8d09b-b0): carrier: link connected Dec 12 13:37:58 np0005557561.novalocal kernel: tapb3b8d09b-b0: entered promiscuous mode Dec 12 13:37:58 np0005557561.novalocal sudo[99988]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b3b8d09b-b33d-40ae-a881-d527881c25ec env PROCESS_TAG=haproxy-b3b8d09b-b33d-40ae-a881-d527881c25ec haproxy -f /var/lib/neutron/ovn-metadata-proxy/b3b8d09b-b33d-40ae-a881-d527881c25ec.conf Dec 12 13:37:58 np0005557561.novalocal systemd[1]: Started Session c274 of User root. Dec 12 13:37:58 np0005557561.novalocal sudo[99988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:37:58 np0005557561.novalocal sudo[99988]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:00 np0005557561.novalocal haproxy-metadata-proxy-114e61f5-d9e6-44c4-8629-7e6b3c9e8ea3[99833]: 10.100.0.5:53526 [12/Dec/2025:13:38:00.112] listener listener/metadata 0/0/0/207/207 200 99 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:38:00 np0005557561.novalocal haproxy-metadata-proxy-114e61f5-d9e6-44c4-8629-7e6b3c9e8ea3[99833]: 10.100.0.5:53528 [12/Dec/2025:13:38:00.582] listener listener/metadata 0/0/0/253/253 200 85 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Dec 12 13:38:01 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:38:01 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:38:01 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:38:04 np0005557561.novalocal kernel: tapd26edcbc-4a (unregistering): left promiscuous mode Dec 12 13:38:04 np0005557561.novalocal NetworkManager[858]: [1765564684.5723] device (tapd26edcbc-4a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:38:04 np0005557561.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Dec 12 13:38:04 np0005557561.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 20.412s CPU time. Dec 12 13:38:04 np0005557561.novalocal systemd-machined[90553]: Machine qemu-10-instance-00000009 terminated. Dec 12 13:38:04 np0005557561.novalocal kernel: tap114e61f5-d0: left promiscuous mode Dec 12 13:38:04 np0005557561.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Dec 12 13:38:04 np0005557561.novalocal systemd[1]: run-netns-ovnmeta\x2d114e61f5\x2dd9e6\x2d44c4\x2d8629\x2d7e6b3c9e8ea3.mount: Deactivated successfully. Dec 12 13:38:08 np0005557561.novalocal sudo[100081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:38:08 np0005557561.novalocal systemd[1]: Started Session c275 of User root. Dec 12 13:38:08 np0005557561.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:38:09 np0005557561.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:09 np0005557561.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Dec 12 13:38:09 np0005557561.novalocal sudo[100086]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:38:09 np0005557561.novalocal systemd[1]: Started Session c276 of User root. Dec 12 13:38:09 np0005557561.novalocal sudo[100086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:38:09 np0005557561.novalocal sudo[100086]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:09 np0005557561.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Dec 12 13:38:09 np0005557561.novalocal sudo[100092]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:38:09 np0005557561.novalocal systemd[1]: Started Session c277 of User root. Dec 12 13:38:09 np0005557561.novalocal sudo[100092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:38:10 np0005557561.novalocal sudo[100092]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:10 np0005557561.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Dec 12 13:38:10 np0005557561.novalocal sudo[100096]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:38:10 np0005557561.novalocal systemd[1]: Started Session c278 of User root. Dec 12 13:38:10 np0005557561.novalocal sudo[100096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:38:10 np0005557561.novalocal sudo[100096]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:10 np0005557561.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48094 [12/Dec/2025:13:38:14.868] listener listener/metadata 0/0/0/146/146 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48110 [12/Dec/2025:13:38:15.087] listener listener/metadata 0/0/0/9/9 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48126 [12/Dec/2025:13:38:15.133] listener listener/metadata 0/0/0/14/14 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48130 [12/Dec/2025:13:38:15.200] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48144 [12/Dec/2025:13:38:15.250] listener listener/metadata 0/0/0/15/15 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48156 [12/Dec/2025:13:38:15.341] listener listener/metadata 0/0/0/11/11 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48172 [12/Dec/2025:13:38:15.421] listener listener/metadata 0/0/0/14/14 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48188 [12/Dec/2025:13:38:15.518] listener listener/metadata 0/0/0/15/15 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48194 [12/Dec/2025:13:38:15.598] listener listener/metadata 0/0/0/13/13 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48206 [12/Dec/2025:13:38:15.650] listener listener/metadata 0/0/0/12/12 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48218 [12/Dec/2025:13:38:15.735] listener listener/metadata 0/0/0/13/13 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48224 [12/Dec/2025:13:38:15.810] listener listener/metadata 0/0/0/11/11 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48226 [12/Dec/2025:13:38:15.857] listener listener/metadata 0/0/0/11/11 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48238 [12/Dec/2025:13:38:15.903] listener listener/metadata 0/0/0/12/12 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 12 13:38:15 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48250 [12/Dec/2025:13:38:15.957] listener listener/metadata 0/0/0/13/13 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 12 13:38:16 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.8:48266 [12/Dec/2025:13:38:16.012] listener listener/metadata 0/0/0/12/12 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 12 13:38:25 np0005557561.novalocal sshd-session[100153]: Connection closed by authenticating user root 167.71.2.158 port 40690 [preauth] Dec 12 13:38:35 np0005557561.novalocal sudo[100176]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpct815k8y/privsep.sock Dec 12 13:38:35 np0005557561.novalocal systemd[1]: Started Session c279 of User root. Dec 12 13:38:35 np0005557561.novalocal sudo[100176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:38:35 np0005557561.novalocal kernel: tap20b34cc4-34: entered promiscuous mode Dec 12 13:38:35 np0005557561.novalocal NetworkManager[858]: [1765564715.4716] manager: (tap20b34cc4-34): new Tun device (/org/freedesktop/NetworkManager/Devices/33) Dec 12 13:38:35 np0005557561.novalocal virtqemud[93658]: Domain id=12 name='instance-0000000b' uuid=245bb36b-7a8d-4902-82a9-21314e1614bb is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Dec 12 13:38:35 np0005557561.novalocal virtqemud[93658]: Domain id=12 name='instance-0000000b' uuid=245bb36b-7a8d-4902-82a9-21314e1614bb is tainted: deprecated-config (CPU model 'qemu64') Dec 12 13:38:35 np0005557561.novalocal systemd-machined[90553]: New machine qemu-12-instance-0000000b. Dec 12 13:38:35 np0005557561.novalocal systemd-udevd[100198]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:38:35 np0005557561.novalocal systemd[1]: Started Virtual Machine qemu-12-instance-0000000b. Dec 12 13:38:35 np0005557561.novalocal NetworkManager[858]: [1765564715.5474] device (tap20b34cc4-34): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Dec 12 13:38:35 np0005557561.novalocal NetworkManager[858]: [1765564715.5480] device (tap20b34cc4-34): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Dec 12 13:38:35 np0005557561.novalocal sudo[100176]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:37 np0005557561.novalocal sudo[100225]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpclq27pt4/privsep.sock Dec 12 13:38:37 np0005557561.novalocal systemd[1]: Started Session c280 of User root. Dec 12 13:38:37 np0005557561.novalocal sudo[100225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:38:37 np0005557561.novalocal sudo[100225]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:38 np0005557561.novalocal sudo[100238]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Dec 12 13:38:38 np0005557561.novalocal systemd[1]: Started Session c281 of User root. Dec 12 13:38:38 np0005557561.novalocal sudo[100238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:38:39 np0005557561.novalocal kernel: vgacc75e89-9d2: entered promiscuous mode Dec 12 13:38:39 np0005557561.novalocal NetworkManager[858]: [1765564719.2634] manager: (vgacc75e89-9d2): 'openvswitch' plugin not available; creating generic device Dec 12 13:38:39 np0005557561.novalocal NetworkManager[858]: [1765564719.2654] manager: (vgacc75e89-9d2): new Generic device (/org/freedesktop/NetworkManager/Devices/34) Dec 12 13:38:39 np0005557561.novalocal systemd-udevd[100273]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:38:39 np0005557561.novalocal NetworkManager[858]: [1765564719.4016] manager: (tapcb9d9412-20): new Veth device (/org/freedesktop/NetworkManager/Devices/35) Dec 12 13:38:39 np0005557561.novalocal NetworkManager[858]: [1765564719.4661] device (tapcb9d9412-20): carrier: link connected Dec 12 13:38:39 np0005557561.novalocal kernel: tapcb9d9412-20: entered promiscuous mode Dec 12 13:38:39 np0005557561.novalocal sudo[100300]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-cb9d9412-20b6-48d2-b9bb-6a64fa326d66 env PROCESS_TAG=haproxy-cb9d9412-20b6-48d2-b9bb-6a64fa326d66 haproxy -f /var/lib/neutron/ovn-metadata-proxy/cb9d9412-20b6-48d2-b9bb-6a64fa326d66.conf Dec 12 13:38:39 np0005557561.novalocal systemd[1]: Started Session c282 of User root. Dec 12 13:38:39 np0005557561.novalocal sudo[100300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Dec 12 13:38:40 np0005557561.novalocal sudo[100300]: pam_unix(sudo:session): session closed for user root Dec 12 13:38:40 np0005557561.novalocal NetworkManager[858]: [1765564720.2815] manager: (vr92c25fcc-33f): 'openvswitch' plugin not available; creating generic device Dec 12 13:38:40 np0005557561.novalocal kernel: vr92c25fcc-33f: entered promiscuous mode Dec 12 13:38:40 np0005557561.novalocal systemd-udevd[100280]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:38:40 np0005557561.novalocal NetworkManager[858]: [1765564720.2830] manager: (vr92c25fcc-33f): new Generic device (/org/freedesktop/NetworkManager/Devices/36) Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: libvirt version: 11.9.0, package: 1.el9 (builder@centos.org, 2025-11-04-09:54:50, ) Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: hostname: np0005557561.novalocal Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:40 np0005557561.novalocal virtnodedevd[93741]: ethtool ioctl error on vr92c25fcc-33f: No such device Dec 12 13:38:42 np0005557561.novalocal kernel: IPv4 over IPsec tunneling driver Dec 12 13:38:42 np0005557561.novalocal NetworkManager[858]: [1765564722.6365] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/37) Dec 12 13:38:42 np0005557561.novalocal systemd-udevd[100594]: Network interface NamePolicy= disabled on kernel command line. Dec 12 13:38:42 np0005557561.novalocal kernel: IPsec XFRM device driver Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37106 [12/Dec/2025:13:38:59.920] listener listener/metadata 0/0/0/142/142 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:39:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:39:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37110 [12/Dec/2025:13:39:00.166] listener listener/metadata 0/0/0/13/13 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37114 [12/Dec/2025:13:39:00.208] listener listener/metadata 0/0/0/15/15 200 292 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37116 [12/Dec/2025:13:39:00.272] listener listener/metadata 0/0/0/11/11 200 97 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37128 [12/Dec/2025:13:39:00.321] listener listener/metadata 0/0/0/16/16 200 87 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37136 [12/Dec/2025:13:39:00.375] listener listener/metadata 0/0/0/12/12 200 93 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37150 [12/Dec/2025:13:39:00.426] listener listener/metadata 0/0/0/13/13 200 98 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37162 [12/Dec/2025:13:39:00.477] listener listener/metadata 0/0/0/10/10 200 99 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37168 [12/Dec/2025:13:39:00.560] listener listener/metadata 0/0/0/15/15 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37178 [12/Dec/2025:13:39:00.643] listener listener/metadata 0/0/0/15/15 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37190 [12/Dec/2025:13:39:00.720] listener listener/metadata 0/0/0/14/14 404 248 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37204 [12/Dec/2025:13:39:00.785] listener listener/metadata 0/0/0/18/18 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37216 [12/Dec/2025:13:39:00.838] listener listener/metadata 0/0/0/12/12 200 89 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37224 [12/Dec/2025:13:39:00.878] listener listener/metadata 0/0/0/10/10 200 94 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Dec 12 13:39:00 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37240 [12/Dec/2025:13:39:00.928] listener listener/metadata 0/0/0/17/17 200 141 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Dec 12 13:39:01 np0005557561.novalocal haproxy-metadata-proxy-b3b8d09b-b33d-40ae-a881-d527881c25ec[99993]: 10.100.0.14:37244 [12/Dec/2025:13:39:00.988] listener listener/metadata 0/0/0/12/12 200 90 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Dec 12 13:39:03 np0005557561.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Dec 12 13:39:03 np0005557561.novalocal kernel: tapcb9d9412-20: left promiscuous mode Dec 12 13:39:07 np0005557561.novalocal kernel: vr92c25fcc-33f: left promiscuous mode Dec 12 13:39:07 np0005557561.novalocal kernel: vgacc75e89-9d2: left promiscuous mode Dec 12 13:39:07 np0005557561.novalocal systemd[1]: run-netns-qvpn\x2df2fab58b\x2ddf0b\x2d48cc\x2db758\x2d01c230688122.mount: Deactivated successfully. Dec 12 13:39:07 np0005557561.novalocal kernel: tap20b34cc4-34 (unregistering): left promiscuous mode Dec 12 13:39:07 np0005557561.novalocal NetworkManager[858]: [1765564747.8349] device (tap20b34cc4-34): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:39:07 np0005557561.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Deactivated successfully. Dec 12 13:39:07 np0005557561.novalocal systemd[1]: machine-qemu\x2d12\x2dinstance\x2d0000000b.scope: Consumed 17.611s CPU time. Dec 12 13:39:07 np0005557561.novalocal systemd-machined[90553]: Machine qemu-12-instance-0000000b terminated. Dec 12 13:39:08 np0005557561.novalocal sudo[100901]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:39:08 np0005557561.novalocal systemd[1]: Started Session c283 of User root. Dec 12 13:39:08 np0005557561.novalocal sudo[100901]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:39:09 np0005557561.novalocal sudo[100901]: pam_unix(sudo:session): session closed for user root Dec 12 13:39:09 np0005557561.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Dec 12 13:39:09 np0005557561.novalocal sudo[100906]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:39:09 np0005557561.novalocal systemd[1]: Started Session c284 of User root. Dec 12 13:39:09 np0005557561.novalocal sudo[100906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:39:09 np0005557561.novalocal sudo[100906]: pam_unix(sudo:session): session closed for user root Dec 12 13:39:09 np0005557561.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Dec 12 13:39:09 np0005557561.novalocal sudo[100915]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:39:09 np0005557561.novalocal systemd[1]: Started Session c285 of User root. Dec 12 13:39:09 np0005557561.novalocal sudo[100915]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:39:09 np0005557561.novalocal sshd-session[100910]: Connection closed by authenticating user root 167.71.2.158 port 51966 [preauth] Dec 12 13:39:10 np0005557561.novalocal sudo[100915]: pam_unix(sudo:session): session closed for user root Dec 12 13:39:10 np0005557561.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Dec 12 13:39:10 np0005557561.novalocal sudo[100919]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:39:10 np0005557561.novalocal systemd[1]: Started Session c286 of User root. Dec 12 13:39:10 np0005557561.novalocal sudo[100919]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:39:10 np0005557561.novalocal sudo[100919]: pam_unix(sudo:session): session closed for user root Dec 12 13:39:10 np0005557561.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Dec 12 13:39:18 np0005557561.novalocal kernel: tapb73ac4c8-e9 (unregistering): left promiscuous mode Dec 12 13:39:18 np0005557561.novalocal NetworkManager[858]: [1765564758.8149] device (tapb73ac4c8-e9): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Dec 12 13:39:18 np0005557561.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Dec 12 13:39:18 np0005557561.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 20.859s CPU time. Dec 12 13:39:18 np0005557561.novalocal systemd-machined[90553]: Machine qemu-11-instance-0000000a terminated. Dec 12 13:39:18 np0005557561.novalocal kernel: tapb3b8d09b-b0: left promiscuous mode Dec 12 13:39:18 np0005557561.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Dec 12 13:39:35 np0005557561.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 12 13:39:35 np0005557561.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 12 13:39:36 np0005557561.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Dec 12 13:39:37 np0005557561.novalocal setroubleshoot[100979]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l a7e577a2-da8a-400f-8b97-92a8447b2c4b Dec 12 13:39:37 np0005557561.novalocal setroubleshoot[100979]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:39:38 np0005557561.novalocal setroubleshoot[100979]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l a7e577a2-da8a-400f-8b97-92a8447b2c4b Dec 12 13:39:38 np0005557561.novalocal setroubleshoot[100979]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Dec 12 13:39:48 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Dec 12 13:39:48 np0005557561.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.260s CPU time. Dec 12 13:39:49 np0005557561.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 12 13:39:49 np0005557561.novalocal systemd[1]: setroubleshootd.service: Consumed 1.441s CPU time. Dec 12 13:39:55 np0005557561.novalocal sshd-session[101054]: Connection closed by authenticating user root 167.71.2.158 port 42538 [preauth] Dec 12 13:40:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:40:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:40:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:40:08 np0005557561.novalocal sudo[101069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:40:08 np0005557561.novalocal systemd[1]: Started Session c287 of User root. Dec 12 13:40:08 np0005557561.novalocal sudo[101069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:40:09 np0005557561.novalocal sudo[101069]: pam_unix(sudo:session): session closed for user root Dec 12 13:40:09 np0005557561.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Dec 12 13:40:09 np0005557561.novalocal sudo[101073]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:40:09 np0005557561.novalocal systemd[1]: Started Session c288 of User root. Dec 12 13:40:09 np0005557561.novalocal sudo[101073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:40:09 np0005557561.novalocal sudo[101073]: pam_unix(sudo:session): session closed for user root Dec 12 13:40:09 np0005557561.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Dec 12 13:40:09 np0005557561.novalocal sudo[101077]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:40:09 np0005557561.novalocal systemd[1]: Started Session c289 of User root. Dec 12 13:40:09 np0005557561.novalocal sudo[101077]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:40:10 np0005557561.novalocal sudo[101077]: pam_unix(sudo:session): session closed for user root Dec 12 13:40:10 np0005557561.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Dec 12 13:40:10 np0005557561.novalocal sudo[101081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:40:10 np0005557561.novalocal systemd[1]: Started Session c290 of User root. Dec 12 13:40:10 np0005557561.novalocal sudo[101081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:40:10 np0005557561.novalocal sudo[101081]: pam_unix(sudo:session): session closed for user root Dec 12 13:40:10 np0005557561.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Dec 12 13:40:44 np0005557561.novalocal sshd-session[101116]: Connection closed by authenticating user root 167.71.2.158 port 40584 [preauth] Dec 12 13:41:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:41:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:41:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:41:08 np0005557561.novalocal sudo[101174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:41:08 np0005557561.novalocal systemd[1]: Started Session c291 of User root. Dec 12 13:41:08 np0005557561.novalocal sudo[101174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:41:09 np0005557561.novalocal sudo[101174]: pam_unix(sudo:session): session closed for user root Dec 12 13:41:09 np0005557561.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Dec 12 13:41:09 np0005557561.novalocal sudo[101178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:41:09 np0005557561.novalocal systemd[1]: Started Session c292 of User root. Dec 12 13:41:09 np0005557561.novalocal sudo[101178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:41:09 np0005557561.novalocal sudo[101178]: pam_unix(sudo:session): session closed for user root Dec 12 13:41:09 np0005557561.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Dec 12 13:41:09 np0005557561.novalocal sudo[101182]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:41:09 np0005557561.novalocal systemd[1]: Started Session c293 of User root. Dec 12 13:41:09 np0005557561.novalocal sudo[101182]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:41:10 np0005557561.novalocal sudo[101182]: pam_unix(sudo:session): session closed for user root Dec 12 13:41:10 np0005557561.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Dec 12 13:41:10 np0005557561.novalocal sudo[101186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:41:10 np0005557561.novalocal systemd[1]: Started Session c294 of User root. Dec 12 13:41:10 np0005557561.novalocal sudo[101186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:41:10 np0005557561.novalocal sudo[101186]: pam_unix(sudo:session): session closed for user root Dec 12 13:41:10 np0005557561.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Dec 12 13:41:30 np0005557561.novalocal sshd-session[101209]: Connection closed by authenticating user root 167.71.2.158 port 43404 [preauth] Dec 12 13:42:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:42:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:42:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:42:08 np0005557561.novalocal sudo[101279]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:42:08 np0005557561.novalocal systemd[1]: Started Session c295 of User root. Dec 12 13:42:08 np0005557561.novalocal sudo[101279]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:42:09 np0005557561.novalocal sudo[101279]: pam_unix(sudo:session): session closed for user root Dec 12 13:42:09 np0005557561.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Dec 12 13:42:09 np0005557561.novalocal sudo[101283]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:42:09 np0005557561.novalocal systemd[1]: Started Session c296 of User root. Dec 12 13:42:09 np0005557561.novalocal sudo[101283]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:42:09 np0005557561.novalocal sudo[101283]: pam_unix(sudo:session): session closed for user root Dec 12 13:42:09 np0005557561.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Dec 12 13:42:09 np0005557561.novalocal sudo[101288]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:42:09 np0005557561.novalocal systemd[1]: Started Session c297 of User root. Dec 12 13:42:09 np0005557561.novalocal sudo[101288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:42:10 np0005557561.novalocal sudo[101288]: pam_unix(sudo:session): session closed for user root Dec 12 13:42:10 np0005557561.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Dec 12 13:42:10 np0005557561.novalocal sudo[101295]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:42:10 np0005557561.novalocal systemd[1]: Started Session c298 of User root. Dec 12 13:42:10 np0005557561.novalocal sudo[101295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:42:10 np0005557561.novalocal sudo[101295]: pam_unix(sudo:session): session closed for user root Dec 12 13:42:10 np0005557561.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Dec 12 13:42:15 np0005557561.novalocal sshd-session[101301]: Connection closed by authenticating user root 167.71.2.158 port 56168 [preauth] Dec 12 13:42:59 np0005557561.novalocal sshd-session[101378]: Connection closed by authenticating user root 167.71.2.158 port 54112 [preauth] Dec 12 13:43:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:43:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:43:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:43:08 np0005557561.novalocal sudo[101386]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:43:08 np0005557561.novalocal systemd[1]: Started Session c299 of User root. Dec 12 13:43:08 np0005557561.novalocal sudo[101386]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:43:09 np0005557561.novalocal sudo[101386]: pam_unix(sudo:session): session closed for user root Dec 12 13:43:09 np0005557561.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Dec 12 13:43:09 np0005557561.novalocal sudo[101391]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:43:09 np0005557561.novalocal systemd[1]: Started Session c300 of User root. Dec 12 13:43:09 np0005557561.novalocal sudo[101391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:43:09 np0005557561.novalocal sudo[101391]: pam_unix(sudo:session): session closed for user root Dec 12 13:43:09 np0005557561.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Dec 12 13:43:09 np0005557561.novalocal sudo[101395]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:43:09 np0005557561.novalocal systemd[1]: Started Session c301 of User root. Dec 12 13:43:09 np0005557561.novalocal sudo[101395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:43:10 np0005557561.novalocal sudo[101395]: pam_unix(sudo:session): session closed for user root Dec 12 13:43:10 np0005557561.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Dec 12 13:43:10 np0005557561.novalocal sudo[101399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:43:10 np0005557561.novalocal systemd[1]: Started Session c302 of User root. Dec 12 13:43:10 np0005557561.novalocal sudo[101399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:43:10 np0005557561.novalocal sudo[101399]: pam_unix(sudo:session): session closed for user root Dec 12 13:43:10 np0005557561.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Dec 12 13:43:18 np0005557561.novalocal sshd-session[101410]: Invalid user admin from 78.128.112.74 port 54442 Dec 12 13:43:18 np0005557561.novalocal sshd-session[101410]: Connection closed by invalid user admin 78.128.112.74 port 54442 [preauth] Dec 12 13:43:42 np0005557561.novalocal sshd-session[101434]: Connection closed by authenticating user root 167.71.2.158 port 39558 [preauth] Dec 12 13:44:03 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:44:03 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:44:03 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:44:08 np0005557561.novalocal sudo[101492]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:44:08 np0005557561.novalocal systemd[1]: Started Session c303 of User root. Dec 12 13:44:08 np0005557561.novalocal sudo[101492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:44:09 np0005557561.novalocal sudo[101492]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:09 np0005557561.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Dec 12 13:44:09 np0005557561.novalocal sudo[101496]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:44:09 np0005557561.novalocal systemd[1]: Started Session c304 of User root. Dec 12 13:44:09 np0005557561.novalocal sudo[101496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:44:09 np0005557561.novalocal sudo[101496]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:09 np0005557561.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Dec 12 13:44:09 np0005557561.novalocal sudo[101500]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:44:09 np0005557561.novalocal systemd[1]: Started Session c305 of User root. Dec 12 13:44:09 np0005557561.novalocal sudo[101500]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:44:10 np0005557561.novalocal sudo[101500]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:10 np0005557561.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Dec 12 13:44:10 np0005557561.novalocal sudo[101504]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:44:10 np0005557561.novalocal systemd[1]: Started Session c306 of User root. Dec 12 13:44:10 np0005557561.novalocal sudo[101504]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:44:10 np0005557561.novalocal sudo[101504]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:10 np0005557561.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Dec 12 13:44:28 np0005557561.novalocal sshd-session[101523]: Connection closed by authenticating user root 167.71.2.158 port 57202 [preauth] Dec 12 13:44:37 np0005557561.novalocal lvm[101539]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 12 13:44:37 np0005557561.novalocal lvm[101539]: VG lvm-shares finished Dec 12 13:44:38 np0005557561.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 7231359f-89f2-49e1-9df4-8beb54cc1738 r/w with ordered data mode. Quota mode: none. Dec 12 13:44:40 np0005557561.novalocal systemd[1]: var-lib-manila-mnt-share\x2d5b38d30d\x2db811\x2d41b1\x2d83f0\x2dca58466e5eab.mount: Deactivated successfully. Dec 12 13:44:40 np0005557561.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 7231359f-89f2-49e1-9df4-8beb54cc1738. Dec 12 13:44:41 np0005557561.novalocal lvm[101557]: PV /dev/loop3 online, VG lvm-shares is complete. Dec 12 13:44:41 np0005557561.novalocal lvm[101557]: VG lvm-shares finished Dec 12 13:44:50 np0005557561.novalocal sudo[54126]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:51 np0005557561.novalocal sudo[102301]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sjfryqtxtjfqqqyovefsujsmnyczdxmt ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Dec 12 13:44:51 np0005557561.novalocal sudo[102301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:44:51 np0005557561.novalocal python3[102303]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Dec 12 13:44:52 np0005557561.novalocal sudo[102428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102428]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102431]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Dec 12 13:44:52 np0005557561.novalocal sudo[102434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102434]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102437]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Dec 12 13:44:52 np0005557561.novalocal sudo[102440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102440]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Dec 12 13:44:52 np0005557561.novalocal sudo[102443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102443]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102446]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Dec 12 13:44:52 np0005557561.novalocal sudo[102449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102449]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102452]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Dec 12 13:44:52 np0005557561.novalocal sudo[102455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102455]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:52 np0005557561.novalocal sudo[102458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Dec 12 13:44:52 np0005557561.novalocal sudo[102458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:52 np0005557561.novalocal sudo[102458]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102461]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102464]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102467]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102470]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102473]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102476]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102479]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102482]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102485]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102488]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Dec 12 13:44:53 np0005557561.novalocal sudo[102491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102491]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Dec 12 13:44:53 np0005557561.novalocal sudo[102495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102495]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102498]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102501]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Dec 12 13:44:53 np0005557561.novalocal sudo[102504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102504]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102507]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Dec 12 13:44:53 np0005557561.novalocal sudo[102510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102510]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102513]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102516]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Dec 12 13:44:53 np0005557561.novalocal sudo[102519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102519]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:53 np0005557561.novalocal sudo[102522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Dec 12 13:44:53 np0005557561.novalocal sudo[102522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:53 np0005557561.novalocal sudo[102522]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102525]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Dec 12 13:44:54 np0005557561.novalocal sudo[102528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102528]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Dec 12 13:44:54 np0005557561.novalocal sudo[102531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102531]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102534]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102537]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102540]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102543]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Dec 12 13:44:54 np0005557561.novalocal sudo[102546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal virtqemud[93658]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Dec 12 13:44:54 np0005557561.novalocal sudo[102546]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Dec 12 13:44:54 np0005557561.novalocal sudo[102550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102550]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Dec 12 13:44:54 np0005557561.novalocal sudo[102553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102553]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Dec 12 13:44:54 np0005557561.novalocal sudo[102556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102556]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Dec 12 13:44:54 np0005557561.novalocal sudo[102559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102559]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Dec 12 13:44:54 np0005557561.novalocal sudo[102563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102563]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Dec 12 13:44:54 np0005557561.novalocal sudo[102566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102566]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Dec 12 13:44:54 np0005557561.novalocal sudo[102569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102569]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Dec 12 13:44:54 np0005557561.novalocal sudo[102572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102572]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Dec 12 13:44:54 np0005557561.novalocal sudo[102575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102575]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Dec 12 13:44:54 np0005557561.novalocal sudo[102578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102578]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Dec 12 13:44:54 np0005557561.novalocal sudo[102581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:54 np0005557561.novalocal sudo[102581]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:54 np0005557561.novalocal sudo[102584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Dec 12 13:44:55 np0005557561.novalocal sudo[102584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102584]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Dec 12 13:44:55 np0005557561.novalocal sudo[102587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102587]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102590]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Dec 12 13:44:55 np0005557561.novalocal sudo[102594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102594]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102598]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Dec 12 13:44:55 np0005557561.novalocal sudo[102598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102598]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Dec 12 13:44:55 np0005557561.novalocal sudo[102602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102602]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Dec 12 13:44:55 np0005557561.novalocal sudo[102605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102605]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Dec 12 13:44:55 np0005557561.novalocal sudo[102608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102608]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Dec 12 13:44:55 np0005557561.novalocal sudo[102611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102611]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102614]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Dec 12 13:44:55 np0005557561.novalocal sudo[102617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102617]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102620]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Dec 12 13:44:55 np0005557561.novalocal sudo[102623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102623]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102627]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102630]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102633]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102636]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102639]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102642]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102645]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102648]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Dec 12 13:44:55 np0005557561.novalocal sudo[102648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:55 np0005557561.novalocal sudo[102648]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:55 np0005557561.novalocal sudo[102651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Dec 12 13:44:56 np0005557561.novalocal sudo[102651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:56 np0005557561.novalocal sudo[102651]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:56 np0005557561.novalocal sudo[102654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Dec 12 13:44:56 np0005557561.novalocal sudo[102654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:56 np0005557561.novalocal sudo[102654]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:56 np0005557561.novalocal sudo[102657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Dec 12 13:44:56 np0005557561.novalocal sudo[102657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:56 np0005557561.novalocal sudo[102657]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:56 np0005557561.novalocal sudo[102660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Dec 12 13:44:56 np0005557561.novalocal sudo[102660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:56 np0005557561.novalocal sudo[102660]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:56 np0005557561.novalocal sudo[102664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Dec 12 13:44:56 np0005557561.novalocal sudo[102664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:56 np0005557561.novalocal sudo[102664]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:56 np0005557561.novalocal sudo[102671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Dec 12 13:44:56 np0005557561.novalocal sudo[102671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:58 np0005557561.novalocal sudo[102671]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:58 np0005557561.novalocal sudo[102674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Dec 12 13:44:58 np0005557561.novalocal sudo[102674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:44:59 np0005557561.novalocal sudo[102674]: pam_unix(sudo:session): session closed for user root Dec 12 13:44:59 np0005557561.novalocal sudo[102677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Dec 12 13:44:59 np0005557561.novalocal sudo[102677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102677]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:45:00 np0005557561.novalocal sudo[102680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Dec 12 13:45:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:45:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:45:00 np0005557561.novalocal sudo[102680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102680]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Dec 12 13:45:00 np0005557561.novalocal sudo[102685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102685]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102688]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Dec 12 13:45:00 np0005557561.novalocal sudo[102688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102688]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102694]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Dec 12 13:45:00 np0005557561.novalocal sudo[102694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102694]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102697]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Dec 12 13:45:00 np0005557561.novalocal sudo[102697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102697]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102700]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Dec 12 13:45:00 np0005557561.novalocal sudo[102700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102700]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102703]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Dec 12 13:45:00 np0005557561.novalocal sudo[102703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102703]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Dec 12 13:45:00 np0005557561.novalocal sudo[102710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102710]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Dec 12 13:45:00 np0005557561.novalocal sudo[102713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102713]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Dec 12 13:45:00 np0005557561.novalocal sudo[102719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:00 np0005557561.novalocal sudo[102719]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:00 np0005557561.novalocal sudo[102722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Dec 12 13:45:00 np0005557561.novalocal sudo[102722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102722]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Dec 12 13:45:01 np0005557561.novalocal sudo[102726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102726]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Dec 12 13:45:01 np0005557561.novalocal sudo[102729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102729]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Dec 12 13:45:01 np0005557561.novalocal sudo[102732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102732]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102736]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Dec 12 13:45:01 np0005557561.novalocal sudo[102736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102736]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102739]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Dec 12 13:45:01 np0005557561.novalocal sudo[102739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102739]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102742]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Dec 12 13:45:01 np0005557561.novalocal sudo[102742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102742]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Dec 12 13:45:01 np0005557561.novalocal sudo[102745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:01 np0005557561.novalocal sudo[102745]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:01 np0005557561.novalocal sudo[102748]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Dec 12 13:45:01 np0005557561.novalocal sudo[102748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102748]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Dec 12 13:45:03 np0005557561.novalocal sudo[102753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102753]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Dec 12 13:45:03 np0005557561.novalocal sudo[102756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102756]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Dec 12 13:45:03 np0005557561.novalocal sudo[102759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102759]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Dec 12 13:45:03 np0005557561.novalocal sudo[102762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102762]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Dec 12 13:45:03 np0005557561.novalocal sudo[102765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102765]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Dec 12 13:45:03 np0005557561.novalocal sudo[102768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102768]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Dec 12 13:45:03 np0005557561.novalocal sudo[102771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102771]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Dec 12 13:45:03 np0005557561.novalocal sudo[102774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:03 np0005557561.novalocal sudo[102774]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:03 np0005557561.novalocal sudo[102777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Dec 12 13:45:03 np0005557561.novalocal sudo[102777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:04 np0005557561.novalocal sudo[102777]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:04 np0005557561.novalocal sudo[102780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Dec 12 13:45:04 np0005557561.novalocal sudo[102780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:04 np0005557561.novalocal sudo[102780]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:04 np0005557561.novalocal sudo[102784]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Dec 12 13:45:04 np0005557561.novalocal sudo[102784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:04 np0005557561.novalocal sudo[102784]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:08 np0005557561.novalocal sudo[102794]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Dec 12 13:45:08 np0005557561.novalocal systemd[1]: Started Session c307 of User root. Dec 12 13:45:08 np0005557561.novalocal sudo[102794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:45:09 np0005557561.novalocal sudo[102794]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:09 np0005557561.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Dec 12 13:45:09 np0005557561.novalocal sudo[102798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:45:09 np0005557561.novalocal systemd[1]: Started Session c308 of User root. Dec 12 13:45:09 np0005557561.novalocal sudo[102798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:45:09 np0005557561.novalocal sudo[102798]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:09 np0005557561.novalocal systemd[1]: session-c308.scope: Deactivated successfully. Dec 12 13:45:09 np0005557561.novalocal sudo[102802]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Dec 12 13:45:09 np0005557561.novalocal systemd[1]: Started Session c309 of User root. Dec 12 13:45:09 np0005557561.novalocal sudo[102802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:45:09 np0005557561.novalocal sudo[102803]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Dec 12 13:45:09 np0005557561.novalocal sudo[102803]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Dec 12 13:45:10 np0005557561.novalocal sudo[102802]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:10 np0005557561.novalocal systemd[1]: session-c309.scope: Deactivated successfully. Dec 12 13:45:10 np0005557561.novalocal sudo[102809]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Dec 12 13:45:10 np0005557561.novalocal systemd[1]: Started Session c310 of User root. Dec 12 13:45:10 np0005557561.novalocal sudo[102809]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Dec 12 13:45:10 np0005557561.novalocal sudo[102809]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:10 np0005557561.novalocal systemd[1]: session-c310.scope: Deactivated successfully. Dec 12 13:45:11 np0005557561.novalocal sshd-session[102817]: Connection closed by authenticating user root 167.71.2.158 port 45456 [preauth] Dec 12 13:45:12 np0005557561.novalocal sudo[102803]: pam_unix(sudo:session): session closed for user nova Dec 12 13:45:12 np0005557561.novalocal sudo[102821]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Dec 12 13:45:12 np0005557561.novalocal sudo[102821]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Dec 12 13:45:14 np0005557561.novalocal sudo[102821]: pam_unix(sudo:session): session closed for user nova Dec 12 13:45:26 np0005557561.novalocal sudo[102850]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Dec 12 13:45:26 np0005557561.novalocal sudo[102850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102854]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Dec 12 13:45:26 np0005557561.novalocal sudo[102854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102854]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:26 np0005557561.novalocal sudo[102857]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Dec 12 13:45:26 np0005557561.novalocal sudo[102857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102857]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:26 np0005557561.novalocal sudo[102860]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Dec 12 13:45:26 np0005557561.novalocal sudo[102860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102860]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:26 np0005557561.novalocal sudo[102863]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Dec 12 13:45:26 np0005557561.novalocal sudo[102863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102863]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:26 np0005557561.novalocal sudo[102866]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Dec 12 13:45:26 np0005557561.novalocal sudo[102866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:26 np0005557561.novalocal sudo[102866]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:26 np0005557561.novalocal sudo[102869]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Dec 12 13:45:26 np0005557561.novalocal sudo[102869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102869]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102872]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Dec 12 13:45:27 np0005557561.novalocal sudo[102872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102872]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102875]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Dec 12 13:45:27 np0005557561.novalocal sudo[102875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102875]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102878]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:27 np0005557561.novalocal sudo[102878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102878]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102881]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:27 np0005557561.novalocal sudo[102881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102881]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102884]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Dec 12 13:45:27 np0005557561.novalocal sudo[102884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102884]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102887]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Dec 12 13:45:27 np0005557561.novalocal sudo[102887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102887]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102890]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Dec 12 13:45:27 np0005557561.novalocal sudo[102890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102890]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102893]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:27 np0005557561.novalocal sudo[102893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102893]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102896]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:27 np0005557561.novalocal sudo[102896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102896]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102899]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Dec 12 13:45:27 np0005557561.novalocal sudo[102899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102899]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102902]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Dec 12 13:45:27 np0005557561.novalocal sudo[102902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102902]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102905]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Dec 12 13:45:27 np0005557561.novalocal sudo[102905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102905]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102908]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Dec 12 13:45:27 np0005557561.novalocal sudo[102908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102908]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102911]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:27 np0005557561.novalocal sudo[102911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102911]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102914]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:27 np0005557561.novalocal sudo[102914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102914]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102917]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Dec 12 13:45:27 np0005557561.novalocal sudo[102917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102917]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102920]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:27 np0005557561.novalocal sudo[102920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102920]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102923]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:27 np0005557561.novalocal sudo[102923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102923]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102926]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Dec 12 13:45:27 np0005557561.novalocal sudo[102926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102926]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102929]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:27 np0005557561.novalocal sudo[102929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102929]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102932]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:27 np0005557561.novalocal sudo[102932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102932]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102935]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Dec 12 13:45:27 np0005557561.novalocal sudo[102935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102935]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102938]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 12 13:45:27 np0005557561.novalocal sudo[102938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102938]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102941]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Dec 12 13:45:27 np0005557561.novalocal sudo[102941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102941]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102944]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Dec 12 13:45:27 np0005557561.novalocal sudo[102944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102944]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102947]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Dec 12 13:45:27 np0005557561.novalocal sudo[102947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102947]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102950]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Dec 12 13:45:27 np0005557561.novalocal sudo[102950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102950]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102953]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Dec 12 13:45:27 np0005557561.novalocal sudo[102953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102953]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102956]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Dec 12 13:45:27 np0005557561.novalocal sudo[102956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:27 np0005557561.novalocal sudo[102956]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:27 np0005557561.novalocal sudo[102959]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Dec 12 13:45:27 np0005557561.novalocal sudo[102959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102959]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102962]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Dec 12 13:45:28 np0005557561.novalocal sudo[102962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102962]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102965]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Dec 12 13:45:28 np0005557561.novalocal sudo[102965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102965]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102968]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Dec 12 13:45:28 np0005557561.novalocal sudo[102968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102968]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102971]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Dec 12 13:45:28 np0005557561.novalocal sudo[102971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102971]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102974]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Dec 12 13:45:28 np0005557561.novalocal sudo[102974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102974]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102977]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Dec 12 13:45:28 np0005557561.novalocal sudo[102977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102977]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102980]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Dec 12 13:45:28 np0005557561.novalocal sudo[102980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102980]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102983]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:28 np0005557561.novalocal sudo[102983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102983]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102986]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:28 np0005557561.novalocal sudo[102986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102986]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102989]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Dec 12 13:45:28 np0005557561.novalocal sudo[102989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102989]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102992]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Dec 12 13:45:28 np0005557561.novalocal sudo[102992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102992]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102995]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 12 13:45:28 np0005557561.novalocal sudo[102995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102995]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[102998]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Dec 12 13:45:28 np0005557561.novalocal sudo[102998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[102998]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103001]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Dec 12 13:45:28 np0005557561.novalocal sudo[103001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103001]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103004]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Dec 12 13:45:28 np0005557561.novalocal sudo[103004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103004]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103007]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Dec 12 13:45:28 np0005557561.novalocal sudo[103007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103007]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103010]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Dec 12 13:45:28 np0005557561.novalocal sudo[103010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103010]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103013]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Dec 12 13:45:28 np0005557561.novalocal sudo[103013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103013]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103016]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:28 np0005557561.novalocal sudo[103016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103016]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103019]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:28 np0005557561.novalocal sudo[103019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103019]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103022]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Dec 12 13:45:28 np0005557561.novalocal sudo[103022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103022]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103025]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Dec 12 13:45:28 np0005557561.novalocal sudo[103025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103025]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103028]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:28 np0005557561.novalocal sudo[103028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103028]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103031]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:28 np0005557561.novalocal sudo[103031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:28 np0005557561.novalocal sudo[103031]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:28 np0005557561.novalocal sudo[103034]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Dec 12 13:45:29 np0005557561.novalocal sudo[103034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103034]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103037]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Dec 12 13:45:29 np0005557561.novalocal sudo[103037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103037]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103040]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Dec 12 13:45:29 np0005557561.novalocal sudo[103040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103040]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103043]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:29 np0005557561.novalocal sudo[103043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103043]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103046]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:29 np0005557561.novalocal sudo[103046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103046]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103049]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Dec 12 13:45:29 np0005557561.novalocal sudo[103049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103049]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103052]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Dec 12 13:45:29 np0005557561.novalocal sudo[103052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103052]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103055]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Dec 12 13:45:29 np0005557561.novalocal sudo[103055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103055]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103058]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Dec 12 13:45:29 np0005557561.novalocal sudo[103058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103058]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103061]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 12 13:45:29 np0005557561.novalocal sudo[103061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103061]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103064]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Dec 12 13:45:29 np0005557561.novalocal sudo[103064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103064]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103067]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Dec 12 13:45:29 np0005557561.novalocal sudo[103067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103067]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103070]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Dec 12 13:45:29 np0005557561.novalocal sudo[103070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103070]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103073]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 12 13:45:29 np0005557561.novalocal sudo[103073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103073]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103076]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Dec 12 13:45:29 np0005557561.novalocal sudo[103076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103076]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103079]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Dec 12 13:45:29 np0005557561.novalocal sudo[103079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103079]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103082]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Dec 12 13:45:29 np0005557561.novalocal sudo[103082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103082]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103085]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Dec 12 13:45:29 np0005557561.novalocal sudo[103085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103085]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103088]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Dec 12 13:45:29 np0005557561.novalocal sudo[103088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103088]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103091]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Dec 12 13:45:29 np0005557561.novalocal sudo[103091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103091]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103094]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Dec 12 13:45:29 np0005557561.novalocal sudo[103094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103094]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103097]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Dec 12 13:45:29 np0005557561.novalocal sudo[103097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103097]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103100]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Dec 12 13:45:29 np0005557561.novalocal sudo[103100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103100]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103103]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:29 np0005557561.novalocal sudo[103103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103103]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103106]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Dec 12 13:45:29 np0005557561.novalocal sudo[103106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103106]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103109]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Dec 12 13:45:29 np0005557561.novalocal sudo[103109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103109]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103112]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Dec 12 13:45:29 np0005557561.novalocal sudo[103112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103112]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:29 np0005557561.novalocal sudo[103115]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Dec 12 13:45:29 np0005557561.novalocal sudo[103115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:29 np0005557561.novalocal sudo[103115]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103118]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Dec 12 13:45:30 np0005557561.novalocal sudo[103118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103118]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103121]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Dec 12 13:45:30 np0005557561.novalocal sudo[103121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103121]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103124]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Dec 12 13:45:30 np0005557561.novalocal sudo[103124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103124]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103127]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Dec 12 13:45:30 np0005557561.novalocal sudo[103127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103127]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103130]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Dec 12 13:45:30 np0005557561.novalocal sudo[103130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103130]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103133]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Dec 12 13:45:30 np0005557561.novalocal sudo[103133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103133]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103136]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Dec 12 13:45:30 np0005557561.novalocal sudo[103136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103136]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103139]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Dec 12 13:45:30 np0005557561.novalocal sudo[103139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103139]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103142]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Dec 12 13:45:30 np0005557561.novalocal sudo[103142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103142]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103145]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Dec 12 13:45:30 np0005557561.novalocal sudo[103145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103145]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103148]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Dec 12 13:45:30 np0005557561.novalocal sudo[103148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103148]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103151]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Dec 12 13:45:30 np0005557561.novalocal sudo[103151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103151]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103154]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Dec 12 13:45:30 np0005557561.novalocal sudo[103154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103154]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103157]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Dec 12 13:45:30 np0005557561.novalocal sudo[103157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103157]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103160]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Dec 12 13:45:30 np0005557561.novalocal sudo[103160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103160]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103163]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Dec 12 13:45:30 np0005557561.novalocal sudo[103163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103163]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103166]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Dec 12 13:45:30 np0005557561.novalocal sudo[103166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103166]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103169]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Dec 12 13:45:30 np0005557561.novalocal sudo[103169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103169]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103172]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Dec 12 13:45:30 np0005557561.novalocal sudo[103172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103172]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103175]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Dec 12 13:45:30 np0005557561.novalocal sudo[103175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103175]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103178]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Dec 12 13:45:30 np0005557561.novalocal sudo[103178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103178]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103181]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Dec 12 13:45:30 np0005557561.novalocal sudo[103181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103181]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103184]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Dec 12 13:45:30 np0005557561.novalocal sudo[103184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103184]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103187]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Dec 12 13:45:30 np0005557561.novalocal sudo[103187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103187]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:30 np0005557561.novalocal sudo[103190]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Dec 12 13:45:30 np0005557561.novalocal sudo[103190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:30 np0005557561.novalocal sudo[103190]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103193]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Dec 12 13:45:31 np0005557561.novalocal sudo[103193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103193]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103196]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Dec 12 13:45:31 np0005557561.novalocal sudo[103196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103196]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[102850]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Dec 12 13:45:31 np0005557561.novalocal sudo[103199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103202]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251212_132711.log Dec 12 13:45:31 np0005557561.novalocal sudo[103202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103202]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103205]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20251212_133009.log Dec 12 13:45:31 np0005557561.novalocal sudo[103205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103205]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103208]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Dec 12 13:45:31 np0005557561.novalocal sudo[103208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103208]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103211]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Dec 12 13:45:31 np0005557561.novalocal sudo[103211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103211]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103214]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Dec 12 13:45:31 np0005557561.novalocal sudo[103214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103214]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103217]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Dec 12 13:45:31 np0005557561.novalocal sudo[103217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103217]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103220]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Dec 12 13:45:31 np0005557561.novalocal sudo[103220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103220]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103223]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Dec 12 13:45:31 np0005557561.novalocal sudo[103223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103223]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103226]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Dec 12 13:45:31 np0005557561.novalocal sudo[103226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103226]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103229]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Dec 12 13:45:31 np0005557561.novalocal sudo[103229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103229]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103232]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Dec 12 13:45:31 np0005557561.novalocal sudo[103232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103232]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103235]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Dec 12 13:45:31 np0005557561.novalocal sudo[103235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103235]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103238]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Dec 12 13:45:31 np0005557561.novalocal sudo[103238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103238]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103241]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Dec 12 13:45:31 np0005557561.novalocal sudo[103241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103241]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103244]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Dec 12 13:45:31 np0005557561.novalocal sudo[103244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103244]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103247]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Dec 12 13:45:31 np0005557561.novalocal sudo[103247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103247]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103250]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Dec 12 13:45:31 np0005557561.novalocal sudo[103250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103250]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103253]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Dec 12 13:45:31 np0005557561.novalocal sudo[103253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103253]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103256]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Dec 12 13:45:31 np0005557561.novalocal sudo[103256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103256]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103259]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Dec 12 13:45:31 np0005557561.novalocal sudo[103259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103259]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103262]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Dec 12 13:45:31 np0005557561.novalocal sudo[103262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103262]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:31 np0005557561.novalocal sudo[103265]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Dec 12 13:45:31 np0005557561.novalocal sudo[103265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:31 np0005557561.novalocal sudo[103265]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103270]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Dec 12 13:45:32 np0005557561.novalocal sudo[103270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103270]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103273]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Dec 12 13:45:32 np0005557561.novalocal sudo[103273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103273]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103276]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Dec 12 13:45:32 np0005557561.novalocal sudo[103276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103276]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103279]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Dec 12 13:45:32 np0005557561.novalocal sudo[103279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103279]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103282]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Dec 12 13:45:32 np0005557561.novalocal sudo[103282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103282]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103285]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Dec 12 13:45:32 np0005557561.novalocal sudo[103285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103285]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103288]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:32 np0005557561.novalocal sudo[103288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103288]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103291]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:32 np0005557561.novalocal sudo[103291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103291]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103294]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 12 13:45:32 np0005557561.novalocal sudo[103294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103294]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103297]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103297]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103300]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Dec 12 13:45:32 np0005557561.novalocal sudo[103300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103300]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103303]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103303]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103306]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:32 np0005557561.novalocal sudo[103306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103306]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103309]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Dec 12 13:45:32 np0005557561.novalocal sudo[103309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103309]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103312]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103312]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103315]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103315]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103318]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103318]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103321]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103321]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103324]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103324]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103327]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 12 13:45:32 np0005557561.novalocal sudo[103327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103327]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103330]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Dec 12 13:45:32 np0005557561.novalocal sudo[103330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103330]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103333]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Dec 12 13:45:32 np0005557561.novalocal sudo[103333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103333]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103336]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Dec 12 13:45:32 np0005557561.novalocal sudo[103336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103336]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103339]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Dec 12 13:45:32 np0005557561.novalocal sudo[103339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103339]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:32 np0005557561.novalocal sudo[103342]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Dec 12 13:45:32 np0005557561.novalocal sudo[103342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:32 np0005557561.novalocal sudo[103342]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103345]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Dec 12 13:45:33 np0005557561.novalocal sudo[103345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103345]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103348]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Dec 12 13:45:33 np0005557561.novalocal sudo[103348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103348]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103351]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Dec 12 13:45:33 np0005557561.novalocal sudo[103351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103351]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103354]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Dec 12 13:45:33 np0005557561.novalocal sudo[103354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103354]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103357]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Dec 12 13:45:33 np0005557561.novalocal sudo[103357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103357]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103360]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Dec 12 13:45:33 np0005557561.novalocal sudo[103360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103360]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103363]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Dec 12 13:45:33 np0005557561.novalocal sudo[103363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103363]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103366]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Dec 12 13:45:33 np0005557561.novalocal sudo[103366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103366]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103369]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Dec 12 13:45:33 np0005557561.novalocal sudo[103369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103369]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103372]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Dec 12 13:45:33 np0005557561.novalocal sudo[103372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103372]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103375]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Dec 12 13:45:33 np0005557561.novalocal sudo[103375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103375]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103378]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Dec 12 13:45:33 np0005557561.novalocal sudo[103378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103378]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103381]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Dec 12 13:45:33 np0005557561.novalocal sudo[103381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103381]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103384]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Dec 12 13:45:33 np0005557561.novalocal sudo[103384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103384]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103387]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Dec 12 13:45:33 np0005557561.novalocal sudo[103387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103387]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103390]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Dec 12 13:45:33 np0005557561.novalocal sudo[103390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103390]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103393]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Dec 12 13:45:33 np0005557561.novalocal sudo[103393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103393]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103396]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Dec 12 13:45:33 np0005557561.novalocal sudo[103396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103396]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103399]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Dec 12 13:45:33 np0005557561.novalocal sudo[103399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103399]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103403]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Dec 12 13:45:33 np0005557561.novalocal sudo[103403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103403]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103407]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Dec 12 13:45:33 np0005557561.novalocal sudo[103407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103407]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103410]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Dec 12 13:45:33 np0005557561.novalocal sudo[103410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103410]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103413]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Dec 12 13:45:33 np0005557561.novalocal sudo[103413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103413]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103416]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Dec 12 13:45:33 np0005557561.novalocal sudo[103416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103416]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103419]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Dec 12 13:45:33 np0005557561.novalocal sudo[103419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103419]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103422]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Dec 12 13:45:33 np0005557561.novalocal sudo[103422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:33 np0005557561.novalocal sudo[103422]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:33 np0005557561.novalocal sudo[103425]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Dec 12 13:45:34 np0005557561.novalocal sudo[103425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103425]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103428]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Dec 12 13:45:34 np0005557561.novalocal sudo[103428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103428]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103431]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Dec 12 13:45:34 np0005557561.novalocal sudo[103431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103431]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103434]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:34 np0005557561.novalocal sudo[103434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103434]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103437]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Dec 12 13:45:34 np0005557561.novalocal sudo[103437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103437]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103440]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Dec 12 13:45:34 np0005557561.novalocal sudo[103440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103440]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103443]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Dec 12 13:45:34 np0005557561.novalocal sudo[103443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103443]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103446]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Dec 12 13:45:34 np0005557561.novalocal sudo[103446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103446]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103449]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Dec 12 13:45:34 np0005557561.novalocal sudo[103449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103449]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103452]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:34 np0005557561.novalocal sudo[103452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103452]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103455]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103455]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103458]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103458]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103461]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Dec 12 13:45:34 np0005557561.novalocal sudo[103461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103461]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103464]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:34 np0005557561.novalocal sudo[103464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103464]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103467]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:34 np0005557561.novalocal sudo[103467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103467]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103470]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 12 13:45:34 np0005557561.novalocal sudo[103470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103470]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103473]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103473]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103476]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103476]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103479]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:34 np0005557561.novalocal sudo[103479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103479]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103482]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:34 np0005557561.novalocal sudo[103482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103482]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103485]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103485]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103488]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 12 13:45:34 np0005557561.novalocal sudo[103488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103488]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103491]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 12 13:45:34 np0005557561.novalocal sudo[103491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103491]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103494]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Dec 12 13:45:34 np0005557561.novalocal sudo[103494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103494]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103497]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Dec 12 13:45:34 np0005557561.novalocal sudo[103497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103497]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103500]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Dec 12 13:45:34 np0005557561.novalocal sudo[103500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:34 np0005557561.novalocal sudo[103500]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:34 np0005557561.novalocal sudo[103503]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103503]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103506]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Dec 12 13:45:35 np0005557561.novalocal sudo[103506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103506]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103509]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103509]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sshd-session[103402]: Invalid user ubuntu from 103.205.142.244 port 43014 Dec 12 13:45:35 np0005557561.novalocal sudo[103512]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:35 np0005557561.novalocal sudo[103512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103512]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103515]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103515]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103518]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103518]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103521]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103521]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103524]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 12 13:45:35 np0005557561.novalocal sshd-session[103402]: Received disconnect from 103.205.142.244 port 43014:11: [preauth] Dec 12 13:45:35 np0005557561.novalocal sshd-session[103402]: Disconnected from invalid user ubuntu 103.205.142.244 port 43014 [preauth] Dec 12 13:45:35 np0005557561.novalocal sudo[103524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103524]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103527]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103527]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103530]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Dec 12 13:45:35 np0005557561.novalocal sudo[103530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103530]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103533]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103533]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103536]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103536]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103539]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103539]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103542]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Dec 12 13:45:35 np0005557561.novalocal sudo[103542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103542]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103545]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Dec 12 13:45:35 np0005557561.novalocal sudo[103545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103545]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103548]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Dec 12 13:45:35 np0005557561.novalocal sudo[103548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103548]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103551]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Dec 12 13:45:35 np0005557561.novalocal sudo[103551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103551]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103554]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Dec 12 13:45:35 np0005557561.novalocal sudo[103554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103554]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103557]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:35 np0005557561.novalocal sudo[103557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103557]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103560]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103560]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103563]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103563]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103566]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103566]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103569]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103569]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103572]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103572]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103575]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Dec 12 13:45:35 np0005557561.novalocal sudo[103575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:35 np0005557561.novalocal sudo[103575]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:35 np0005557561.novalocal sudo[103578]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103578]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103581]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103581]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103584]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103584]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103587]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103587]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103590]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103590]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103593]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:36 np0005557561.novalocal sudo[103593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103593]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103596]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103596]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103599]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103599]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103602]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103602]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103605]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Dec 12 13:45:36 np0005557561.novalocal sudo[103605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103605]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103608]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Dec 12 13:45:36 np0005557561.novalocal sudo[103608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103608]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103611]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Dec 12 13:45:36 np0005557561.novalocal sudo[103611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103611]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103614]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Dec 12 13:45:36 np0005557561.novalocal sudo[103614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103614]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103617]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Dec 12 13:45:36 np0005557561.novalocal sudo[103617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103617]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103620]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103620]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103623]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103623]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103626]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103626]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103629]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:36 np0005557561.novalocal sudo[103629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103629]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103632]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Dec 12 13:45:36 np0005557561.novalocal sudo[103632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103632]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103635]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103635]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103638]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Dec 12 13:45:36 np0005557561.novalocal sudo[103638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103638]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103641]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103641]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103644]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Dec 12 13:45:36 np0005557561.novalocal sudo[103644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103644]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103647]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Dec 12 13:45:36 np0005557561.novalocal sudo[103647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103647]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103650]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Dec 12 13:45:36 np0005557561.novalocal sudo[103650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103650]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:36 np0005557561.novalocal sudo[103653]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Dec 12 13:45:36 np0005557561.novalocal sudo[103653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:36 np0005557561.novalocal sudo[103653]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103656]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Dec 12 13:45:37 np0005557561.novalocal sudo[103656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103656]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103659]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Dec 12 13:45:37 np0005557561.novalocal sudo[103659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103659]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103662]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Dec 12 13:45:37 np0005557561.novalocal sudo[103662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103662]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103665]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Dec 12 13:45:37 np0005557561.novalocal sudo[103665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103665]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103668]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Dec 12 13:45:37 np0005557561.novalocal sudo[103668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103668]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103671]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Dec 12 13:45:37 np0005557561.novalocal sudo[103671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103671]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103674]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:37 np0005557561.novalocal sudo[103674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103674]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103677]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103677]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103680]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Dec 12 13:45:37 np0005557561.novalocal sudo[103680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103680]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103683]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Dec 12 13:45:37 np0005557561.novalocal sudo[103683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103683]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103686]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103686]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103689]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103689]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103692]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103692]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103695]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103695]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103698]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103698]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103701]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103701]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103704]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103704]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103707]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103707]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103710]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103710]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103713]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103713]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103716]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103716]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103719]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103719]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103722]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103722]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103725]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103725]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103728]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103728]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103731]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Dec 12 13:45:37 np0005557561.novalocal sudo[103731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103731]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103734]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Dec 12 13:45:37 np0005557561.novalocal sudo[103734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:37 np0005557561.novalocal sudo[103734]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:37 np0005557561.novalocal sudo[103737]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Dec 12 13:45:37 np0005557561.novalocal sudo[103737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103737]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103740]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103740]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103743]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Dec 12 13:45:38 np0005557561.novalocal sudo[103743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103743]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103746]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Dec 12 13:45:38 np0005557561.novalocal sudo[103746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103746]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103749]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103749]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103752]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103752]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103755]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103755]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103758]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103758]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103761]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103761]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103764]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103764]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103767]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103767]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103770]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Dec 12 13:45:38 np0005557561.novalocal sudo[103770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103770]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103773]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103773]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103776]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Dec 12 13:45:38 np0005557561.novalocal sudo[103776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103776]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103779]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103779]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103782]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103782]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103785]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103785]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103788]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103788]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103791]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103791]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103794]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103794]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103797]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103797]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103800]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103800]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103803]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103803]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103806]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Dec 12 13:45:38 np0005557561.novalocal sudo[103806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:38 np0005557561.novalocal sudo[103806]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:38 np0005557561.novalocal sudo[103809]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103809]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103812]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103812]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103815]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103815]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103818]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103818]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103821]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Dec 12 13:45:39 np0005557561.novalocal sudo[103821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103821]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103824]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Dec 12 13:45:39 np0005557561.novalocal sudo[103824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103824]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103827]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Dec 12 13:45:39 np0005557561.novalocal sudo[103827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103827]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103830]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Dec 12 13:45:39 np0005557561.novalocal sudo[103830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103830]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103833]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Dec 12 13:45:39 np0005557561.novalocal sudo[103833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103833]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103836]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103836]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103839]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Dec 12 13:45:39 np0005557561.novalocal sudo[103839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103839]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103842]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103842]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103845]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Dec 12 13:45:39 np0005557561.novalocal sudo[103845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103845]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103848]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103848]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103851]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Dec 12 13:45:39 np0005557561.novalocal sudo[103851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103851]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103854]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Dec 12 13:45:39 np0005557561.novalocal sudo[103854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103854]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103857]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103857]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103860]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Dec 12 13:45:39 np0005557561.novalocal sudo[103860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103860]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103863]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Dec 12 13:45:39 np0005557561.novalocal sudo[103863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103863]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103866]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Dec 12 13:45:39 np0005557561.novalocal sudo[103866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103866]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103869]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103869]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103872]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Dec 12 13:45:39 np0005557561.novalocal sudo[103872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103872]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103875]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Dec 12 13:45:39 np0005557561.novalocal sudo[103875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103875]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103878]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Dec 12 13:45:39 np0005557561.novalocal sudo[103878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103878]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:39 np0005557561.novalocal sudo[103881]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Dec 12 13:45:39 np0005557561.novalocal sudo[103881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:39 np0005557561.novalocal sudo[103881]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103884]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Dec 12 13:45:40 np0005557561.novalocal sudo[103884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103884]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103887]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:40 np0005557561.novalocal sudo[103887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103887]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103890]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Dec 12 13:45:40 np0005557561.novalocal sudo[103890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103890]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103893]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103893]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103896]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103896]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103899]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103899]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103902]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103902]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103905]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103905]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103908]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103908]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103911]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103911]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103914]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103914]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103917]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103917]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103920]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103920]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103923]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103923]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103926]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Dec 12 13:45:40 np0005557561.novalocal sudo[103926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103926]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103929]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Dec 12 13:45:40 np0005557561.novalocal sudo[103929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103929]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103932]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Dec 12 13:45:40 np0005557561.novalocal sudo[103932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103932]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103935]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Dec 12 13:45:40 np0005557561.novalocal sudo[103935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103935]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103938]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Dec 12 13:45:40 np0005557561.novalocal sudo[103938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103938]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103941]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Dec 12 13:45:40 np0005557561.novalocal sudo[103941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103941]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103944]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103944]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103947]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Dec 12 13:45:40 np0005557561.novalocal sudo[103947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103947]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:40 np0005557561.novalocal sudo[103950]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Dec 12 13:45:40 np0005557561.novalocal sudo[103950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:40 np0005557561.novalocal sudo[103950]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103953]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Dec 12 13:45:41 np0005557561.novalocal sudo[103953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103953]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103956]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005557561.novalocal.pem Dec 12 13:45:41 np0005557561.novalocal sudo[103956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103956]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103959]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Dec 12 13:45:41 np0005557561.novalocal sudo[103959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103959]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103962]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103962]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103965]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103965]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103968]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103968]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103971]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103971]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103974]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103974]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103977]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Dec 12 13:45:41 np0005557561.novalocal sudo[103977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103977]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103980]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Dec 12 13:45:41 np0005557561.novalocal sudo[103980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103980]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103983]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Dec 12 13:45:41 np0005557561.novalocal sudo[103983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103983]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103986]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Dec 12 13:45:41 np0005557561.novalocal sudo[103986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103986]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103989]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Dec 12 13:45:41 np0005557561.novalocal sudo[103989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103989]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103992]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Dec 12 13:45:41 np0005557561.novalocal sudo[103992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103992]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103995]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Dec 12 13:45:41 np0005557561.novalocal sudo[103995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103995]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[103998]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Dec 12 13:45:41 np0005557561.novalocal sudo[103998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[103998]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104001]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Dec 12 13:45:41 np0005557561.novalocal sudo[104001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104001]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104004]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Dec 12 13:45:41 np0005557561.novalocal sudo[104004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104004]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104007]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Dec 12 13:45:41 np0005557561.novalocal sudo[104007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104007]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104010]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Dec 12 13:45:41 np0005557561.novalocal sudo[104010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104010]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104013]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Dec 12 13:45:41 np0005557561.novalocal sudo[104013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104013]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104016]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Dec 12 13:45:41 np0005557561.novalocal sudo[104016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104016]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104019]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Dec 12 13:45:41 np0005557561.novalocal sudo[104019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104019]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104022]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Dec 12 13:45:41 np0005557561.novalocal sudo[104022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:41 np0005557561.novalocal sudo[104022]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:41 np0005557561.novalocal sudo[104025]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Dec 12 13:45:41 np0005557561.novalocal sudo[104025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104025]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104030]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Dec 12 13:45:42 np0005557561.novalocal sudo[104030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104030]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104033]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 12 13:45:42 np0005557561.novalocal sudo[104033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104033]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104036]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Dec 12 13:45:42 np0005557561.novalocal sudo[104036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104036]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104039]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Dec 12 13:45:42 np0005557561.novalocal sudo[104039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104039]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104042]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Dec 12 13:45:42 np0005557561.novalocal sudo[104042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104042]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104045]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Dec 12 13:45:42 np0005557561.novalocal sudo[104045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104045]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104048]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Dec 12 13:45:42 np0005557561.novalocal sudo[104048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104048]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104051]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Dec 12 13:45:42 np0005557561.novalocal sudo[104051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104051]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104054]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 12 13:45:42 np0005557561.novalocal sudo[104054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104054]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104057]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Dec 12 13:45:42 np0005557561.novalocal sudo[104057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104057]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104060]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Dec 12 13:45:42 np0005557561.novalocal sudo[104060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104060]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104063]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Dec 12 13:45:42 np0005557561.novalocal sudo[104063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104063]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104066]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Dec 12 13:45:42 np0005557561.novalocal sudo[104066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104066]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104069]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Dec 12 13:45:42 np0005557561.novalocal sudo[104069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104069]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104072]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Dec 12 13:45:42 np0005557561.novalocal sudo[104072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104072]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104075]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Dec 12 13:45:42 np0005557561.novalocal sudo[104075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104075]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104078]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Dec 12 13:45:42 np0005557561.novalocal sudo[104078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104078]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104081]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Dec 12 13:45:42 np0005557561.novalocal sudo[104081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104081]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104084]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Dec 12 13:45:42 np0005557561.novalocal sudo[104084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104084]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104087]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Dec 12 13:45:42 np0005557561.novalocal sudo[104087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104087]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104090]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Dec 12 13:45:42 np0005557561.novalocal sudo[104090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104090]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104093]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Dec 12 13:45:42 np0005557561.novalocal sudo[104093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104093]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104096]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Dec 12 13:45:42 np0005557561.novalocal sudo[104096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104096]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104099]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Dec 12 13:45:42 np0005557561.novalocal sudo[104099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104099]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104102]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Dec 12 13:45:42 np0005557561.novalocal sudo[104102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:42 np0005557561.novalocal sudo[104102]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:42 np0005557561.novalocal sudo[104105]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Dec 12 13:45:43 np0005557561.novalocal sudo[104105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104105]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104108]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Dec 12 13:45:43 np0005557561.novalocal sudo[104108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104108]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104111]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Dec 12 13:45:43 np0005557561.novalocal sudo[104111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104111]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104114]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104114]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104117]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104117]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104120]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104120]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104123]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104123]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104126]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104126]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104129]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104129]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104132]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Dec 12 13:45:43 np0005557561.novalocal sudo[104132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104132]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104135]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Dec 12 13:45:43 np0005557561.novalocal sudo[104135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104135]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104138]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Dec 12 13:45:43 np0005557561.novalocal sudo[104138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104138]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104141]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Dec 12 13:45:43 np0005557561.novalocal sudo[104141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104141]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104144]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Dec 12 13:45:43 np0005557561.novalocal sudo[104144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104144]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104147]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Dec 12 13:45:43 np0005557561.novalocal sudo[104147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104147]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104150]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Dec 12 13:45:43 np0005557561.novalocal sudo[104150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104150]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104153]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Dec 12 13:45:43 np0005557561.novalocal sudo[104153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104153]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104156]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Dec 12 13:45:43 np0005557561.novalocal sudo[104156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104156]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104159]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Dec 12 13:45:43 np0005557561.novalocal sudo[104159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104159]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104162]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Dec 12 13:45:43 np0005557561.novalocal sudo[104162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104162]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104165]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Dec 12 13:45:43 np0005557561.novalocal sudo[104165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104165]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104168]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Dec 12 13:45:43 np0005557561.novalocal sudo[104168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104168]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104171]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Dec 12 13:45:43 np0005557561.novalocal sudo[104171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104171]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104174]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Dec 12 13:45:43 np0005557561.novalocal sudo[104174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104174]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104177]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Dec 12 13:45:43 np0005557561.novalocal sudo[104177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104177]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104180]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Dec 12 13:45:43 np0005557561.novalocal sudo[104180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104180]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104183]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Dec 12 13:45:43 np0005557561.novalocal sudo[104183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104183]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104186]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Dec 12 13:45:43 np0005557561.novalocal sudo[104186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104186]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104189]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Dec 12 13:45:43 np0005557561.novalocal sudo[104189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104189]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104192]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Dec 12 13:45:43 np0005557561.novalocal sudo[104192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104192]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104195]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Dec 12 13:45:43 np0005557561.novalocal sudo[104195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:43 np0005557561.novalocal sudo[104195]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:43 np0005557561.novalocal sudo[104198]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000b.log Dec 12 13:45:43 np0005557561.novalocal sudo[104198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104198]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104201]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Dec 12 13:45:44 np0005557561.novalocal sudo[104201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104201]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104204]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Dec 12 13:45:44 np0005557561.novalocal sudo[104204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104204]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104207]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Dec 12 13:45:44 np0005557561.novalocal sudo[104207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104207]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104210]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Dec 12 13:45:44 np0005557561.novalocal sudo[104210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104210]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104213]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Dec 12 13:45:44 np0005557561.novalocal sudo[104213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104213]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104216]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Dec 12 13:45:44 np0005557561.novalocal sudo[104216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104216]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104219]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Dec 12 13:45:44 np0005557561.novalocal sudo[104219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104219]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104222]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Dec 12 13:45:44 np0005557561.novalocal sudo[104222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104222]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104225]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Dec 12 13:45:44 np0005557561.novalocal sudo[104225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104225]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104228]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Dec 12 13:45:44 np0005557561.novalocal sudo[104228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104228]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104231]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Dec 12 13:45:44 np0005557561.novalocal sudo[104231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104231]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104234]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Dec 12 13:45:44 np0005557561.novalocal sudo[104234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104234]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104237]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Dec 12 13:45:44 np0005557561.novalocal sudo[104237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104237]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104240]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Dec 12 13:45:44 np0005557561.novalocal sudo[104240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104240]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104243]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Dec 12 13:45:44 np0005557561.novalocal sudo[104243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104243]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104246]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104246]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104249]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104249]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104252]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104252]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104255]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104255]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104258]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104258]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104261]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104261]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104264]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104264]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104267]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104267]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:44 np0005557561.novalocal sudo[104270]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Dec 12 13:45:44 np0005557561.novalocal sudo[104270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:44 np0005557561.novalocal sudo[104270]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104273]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Dec 12 13:45:45 np0005557561.novalocal sudo[104273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104273]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104276]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Dec 12 13:45:45 np0005557561.novalocal sudo[104276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104276]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104279]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104279]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104282]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104282]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104285]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104285]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104288]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104288]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104291]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104291]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104294]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104294]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104297]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104297]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104300]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104300]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104303]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Dec 12 13:45:45 np0005557561.novalocal sudo[104303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104303]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104306]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Dec 12 13:45:45 np0005557561.novalocal sudo[104306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104306]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104309]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Dec 12 13:45:45 np0005557561.novalocal sudo[104309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104309]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104312]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104312]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104315]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Dec 12 13:45:45 np0005557561.novalocal sudo[104315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104315]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104318]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Dec 12 13:45:45 np0005557561.novalocal sudo[104318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104318]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104321]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Dec 12 13:45:45 np0005557561.novalocal sudo[104321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104321]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104328]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Dec 12 13:45:45 np0005557561.novalocal sudo[104328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104328]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104335]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Dec 12 13:45:45 np0005557561.novalocal sudo[104335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104335]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104366]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104366]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104369]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104369]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104372]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104372]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104375]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104375]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104378]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Dec 12 13:45:45 np0005557561.novalocal sudo[104378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104378]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104381]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Dec 12 13:45:45 np0005557561.novalocal sudo[104381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:45 np0005557561.novalocal sudo[104381]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:45 np0005557561.novalocal sudo[104384]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Dec 12 13:45:45 np0005557561.novalocal sudo[104384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104384]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104387]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104387]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104390]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104390]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104393]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104393]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104396]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104396]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104399]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104399]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104402]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104402]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104405]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104405]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104408]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104408]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104411]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104411]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104414]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104414]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104417]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104417]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104420]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104420]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104423]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104423]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104426]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104426]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104429]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104429]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104432]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104432]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104435]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104435]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104438]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104438]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104441]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104441]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104444]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104444]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104447]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104447]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104450]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104450]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104453]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104453]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:46 np0005557561.novalocal sudo[104456]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Dec 12 13:45:46 np0005557561.novalocal sudo[104456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:46 np0005557561.novalocal sudo[104456]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104459]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Dec 12 13:45:47 np0005557561.novalocal sudo[104459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104459]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104462]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Dec 12 13:45:47 np0005557561.novalocal sudo[104462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104462]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104465]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Dec 12 13:45:47 np0005557561.novalocal sudo[104465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104465]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[103199]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Dec 12 13:45:47 np0005557561.novalocal sudo[104470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104470]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Dec 12 13:45:47 np0005557561.novalocal sudo[104473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104476]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Dec 12 13:45:47 np0005557561.novalocal sudo[104476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104476]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104479]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Dec 12 13:45:47 np0005557561.novalocal sudo[104479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104479]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104482]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Dec 12 13:45:47 np0005557561.novalocal sudo[104482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104482]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104485]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Dec 12 13:45:47 np0005557561.novalocal sudo[104485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104485]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104488]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Dec 12 13:45:47 np0005557561.novalocal sudo[104488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104488]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104491]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Dec 12 13:45:47 np0005557561.novalocal sudo[104491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104491]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104494]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Dec 12 13:45:47 np0005557561.novalocal sudo[104494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104494]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104497]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104497]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104500]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104500]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104503]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104503]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104506]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104506]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104509]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104509]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104512]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104512]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104515]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104515]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104518]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104518]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104522]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104522]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104525]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104525]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104528]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104528]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:47 np0005557561.novalocal sudo[104531]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Dec 12 13:45:47 np0005557561.novalocal sudo[104531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:47 np0005557561.novalocal sudo[104531]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104534]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104534]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104537]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104537]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104540]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104540]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104543]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104543]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104546]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104546]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104549]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104549]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104552]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104552]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104555]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Dec 12 13:45:48 np0005557561.novalocal sudo[104555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104555]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104473]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104559]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251212_132711.log /var/log/weirdo-project/logs/puppet-20251212_132711.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104559]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104562]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20251212_133009.log /var/log/weirdo-project/logs/puppet-20251212_133009.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104562]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104565]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104568]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104571]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104574]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104577]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104580]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104583]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104586]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104589]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104589]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104592]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104592]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104595]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104595]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104598]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104598]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104601]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104601]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104604]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104604]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104607]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104607]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104610]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Dec 12 13:45:48 np0005557561.novalocal sudo[104610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:48 np0005557561.novalocal sudo[104610]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:48 np0005557561.novalocal sudo[104613]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104613]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104616]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104616]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104619]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104619]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104622]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104622]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104625]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104625]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104628]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104628]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104631]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104631]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104634]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104634]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104637]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104637]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104640]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104640]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104643]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104643]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104646]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104646]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104649]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104649]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104652]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104655]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104658]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104658]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104661]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104664]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104667]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104667]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104670]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104670]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104673]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104673]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104676]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104676]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104679]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104679]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104682]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104682]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104685]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104685]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:49 np0005557561.novalocal sudo[104688]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Dec 12 13:45:49 np0005557561.novalocal sudo[104688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:49 np0005557561.novalocal sudo[104688]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104691]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104691]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104694]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104694]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104697]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104697]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104700]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104700]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104703]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104703]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104706]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104706]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104709]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104709]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104712]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104712]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104715]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104715]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104718]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104718]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104721]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104721]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104724]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104724]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104727]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104727]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104730]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104730]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104733]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104733]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104736]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104736]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104739]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000b.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104739]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104742]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104742]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104745]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104745]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104748]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104748]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104751]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104751]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104754]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104754]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:50 np0005557561.novalocal sudo[104757]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Dec 12 13:45:50 np0005557561.novalocal sudo[104757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:50 np0005557561.novalocal sudo[104757]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104760]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104760]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104763]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104763]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104766]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104766]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104769]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104769]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104772]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104772]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104775]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104775]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104778]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104778]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104781]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104781]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104784]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104784]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104787]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104787]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104790]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104790]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104793]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104793]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104796]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104796]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104799]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104799]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104802]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104802]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104805]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104805]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104808]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104808]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104811]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104811]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104814]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104814]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104817]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104817]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104820]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104820]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:51 np0005557561.novalocal sudo[104823]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Dec 12 13:45:51 np0005557561.novalocal sudo[104823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:51 np0005557561.novalocal sudo[104823]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104826]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104826]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104832]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104832]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104835]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104835]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104838]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104838]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104841]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104841]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104844]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104844]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104847]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104847]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104850]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104850]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104853]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104853]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104856]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104856]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104859]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104859]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104862]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104862]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104865]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104865]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104868]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104868]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104871]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104871]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104874]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104874]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104877]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104877]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104880]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104880]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104883]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104883]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104886]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104886]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104889]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104889]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104892]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104892]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104895]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104895]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:52 np0005557561.novalocal sudo[104898]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Dec 12 13:45:52 np0005557561.novalocal sudo[104898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:52 np0005557561.novalocal sudo[104898]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104901]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104901]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104904]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104904]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104907]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104907]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104910]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104910]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104913]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104913]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104916]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104919]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104919]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104922]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104922]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104925]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104925]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104928]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104928]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104931]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104931]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104934]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104934]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104937]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104937]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104940]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104940]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104943]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104943]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104946]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104946]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104949]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104949]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104952]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104952]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104955]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104955]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104958]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104958]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104961]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104961]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104964]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104964]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:53 np0005557561.novalocal sudo[104967]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Dec 12 13:45:53 np0005557561.novalocal sudo[104967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:53 np0005557561.novalocal sudo[104967]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104970]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104970]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104973]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104973]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104976]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104976]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104979]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104979]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104982]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104982]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104985]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104985]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104988]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104988]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104991]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104991]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104994]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104994]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[104997]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[104997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[104997]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105000]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105003]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105006]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105009]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105012]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105015]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105018]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105021]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105024]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105027]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105030]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105033]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:54 np0005557561.novalocal sudo[105036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Dec 12 13:45:54 np0005557561.novalocal sudo[105036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:54 np0005557561.novalocal sudo[105036]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105039]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105042]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105045]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105048]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105051]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105054]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105057]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105060]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105063]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105066]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105069]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105072]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105075]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105078]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105081]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105084]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105087]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105090]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105093]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105096]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105099]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:55 np0005557561.novalocal sudo[105102]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:55 np0005557561.novalocal sudo[105105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:55 np0005557561.novalocal sudo[105105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105105]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105108]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105111]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105114]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105117]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105120]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105123]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105126]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105129]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105132]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105135]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105138]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105141]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105144]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105147]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105150]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105153]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105156]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105159]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105162]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105165]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105168]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105171]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105174]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Dec 12 13:45:56 np0005557561.novalocal sudo[105177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:56 np0005557561.novalocal sudo[105177]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:56 np0005557561.novalocal sudo[105180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105180]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105183]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105186]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105189]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105192]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105195]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105198]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105201]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105204]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105207]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105210]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105213]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105216]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105219]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105222]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105225]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105228]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105231]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105234]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105237]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105240]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105243]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105246]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105249]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105252]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105255]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105258]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105261]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Dec 12 13:45:57 np0005557561.novalocal sudo[105264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:57 np0005557561.novalocal sudo[105264]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:57 np0005557561.novalocal sudo[105267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105267]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105272]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105272]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105275]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105275]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105278]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105278]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105281]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105281]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105284]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105284]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105287]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105287]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105290]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105293]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105296]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105299]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105299]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105302]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105302]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sshd-session[105268]: Connection closed by authenticating user root 167.71.2.158 port 41102 [preauth] Dec 12 13:45:58 np0005557561.novalocal sudo[105305]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105305]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105308]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105311]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105311]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105314]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105314]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005557561.novalocal.pem.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105317]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105320]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105320]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105323]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105323]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105326]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105326]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105329]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105329]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105332]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105332]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105335]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105335]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105338]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:58 np0005557561.novalocal sudo[105338]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:58 np0005557561.novalocal sudo[105341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Dec 12 13:45:58 np0005557561.novalocal sudo[105341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105341]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105344]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105347]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105350]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105353]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105356]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105359]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105362]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105365]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105368]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105371]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105374]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105377]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105380]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105383]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105386]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105389]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105392]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105395]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105398]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105401]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105404]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105407]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Dec 12 13:45:59 np0005557561.novalocal sudo[105410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:45:59 np0005557561.novalocal sudo[105410]: pam_unix(sudo:session): session closed for user root Dec 12 13:45:59 np0005557561.novalocal sudo[105413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Dec 12 13:46:00 np0005557561.novalocal systemd[1]: Starting system activity accounting tool... Dec 12 13:46:00 np0005557561.novalocal sudo[105413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105413]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Dec 12 13:46:00 np0005557561.novalocal systemd[1]: Finished system activity accounting tool. Dec 12 13:46:00 np0005557561.novalocal sudo[105417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105417]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105421]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105421]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105424]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105424]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105427]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105427]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105430]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105430]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105433]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105433]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105436]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105436]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105439]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105439]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105442]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105442]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105445]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105445]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105448]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105448]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105451]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105451]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105454]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105454]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105457]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105457]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105460]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105460]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105463]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105466]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105469]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105469]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105472]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105472]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105475]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105475]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105478]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105478]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:00 np0005557561.novalocal sudo[105481]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Dec 12 13:46:00 np0005557561.novalocal sudo[105481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:00 np0005557561.novalocal sudo[105481]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105484]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105484]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105487]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105487]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105490]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105490]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105493]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105493]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105496]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105496]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105499]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105499]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105502]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105502]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105505]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105508]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105508]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105511]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105511]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105514]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105514]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105517]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105517]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105520]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105523]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105526]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105526]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105529]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005557561.novalocal.pem.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105532]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105535]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105538]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105541]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105541]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105544]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105544]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105547]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105547]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:01 np0005557561.novalocal sudo[105550]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Dec 12 13:46:01 np0005557561.novalocal sudo[105550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:01 np0005557561.novalocal sudo[105550]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105553]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105558]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105561]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105564]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105567]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105570]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105570]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105573]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105573]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105576]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105576]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105579]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105579]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105582]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105582]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105585]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105588]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105588]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105591]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105591]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105594]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105594]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105597]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105597]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105600]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105600]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105603]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005557561.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005557561.novalocal.pem.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105603]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105606]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105606]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105609]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105609]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105612]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105612]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105615]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105615]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105618]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105618]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105621]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105621]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105624]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105624]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:02 np0005557561.novalocal sudo[105627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Dec 12 13:46:02 np0005557561.novalocal sudo[105627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:02 np0005557561.novalocal sudo[105627]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Dec 12 13:46:03 np0005557561.novalocal sudo[105630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:03 np0005557561.novalocal sudo[105630]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105633]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Dec 12 13:46:03 np0005557561.novalocal sudo[105633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:03 np0005557561.novalocal sudo[105633]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Dec 12 13:46:03 np0005557561.novalocal sudo[105636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Dec 12 13:46:03 np0005557561.novalocal sudo[105636]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[102301]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105749]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-raefmdyyuscuzzirezihjfggcltpozmo ; /usr/bin/python3' Dec 12 13:46:03 np0005557561.novalocal sudo[105749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:03 np0005557561.novalocal python3[105751]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:03 np0005557561.novalocal sudo[105749]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105757]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wwvwzxkykspyvagoncksjobdyjvwnxbu ; /usr/bin/python3' Dec 12 13:46:03 np0005557561.novalocal sudo[105757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:03 np0005557561.novalocal python3[105759]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:03 np0005557561.novalocal sudo[105757]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:03 np0005557561.novalocal sudo[105764]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uvxhwqeulkxflugbdrlibvwdpxjzsvzs ; /usr/bin/python3' Dec 12 13:46:03 np0005557561.novalocal sudo[105764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:04 np0005557561.novalocal python3[105766]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:04 np0005557561.novalocal sudo[105764]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:04 np0005557561.novalocal sudo[105771]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vjwqcnjxflsvhsigrvtrtohhnahmzcyw ; /usr/bin/python3' Dec 12 13:46:04 np0005557561.novalocal sudo[105771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:04 np0005557561.novalocal python3[105773]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:04 np0005557561.novalocal sudo[105771]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:04 np0005557561.novalocal sudo[105778]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ytetnwklaudxdpclzblfairxjezkokpu ; /usr/bin/python3' Dec 12 13:46:04 np0005557561.novalocal sudo[105778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:04 np0005557561.novalocal python3[105780]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:04 np0005557561.novalocal sudo[105778]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:04 np0005557561.novalocal sudo[105785]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xonnpcsuyxfmsxidmifkjzdimyxcwxjh ; /usr/bin/python3' Dec 12 13:46:04 np0005557561.novalocal sudo[105785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:04 np0005557561.novalocal python3[105787]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:04 np0005557561.novalocal sudo[105785]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:04 np0005557561.novalocal sudo[105792]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dazvffdhdqebzemvpszfzifjcixppocd ; /usr/bin/python3' Dec 12 13:46:04 np0005557561.novalocal sudo[105792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:05 np0005557561.novalocal python3[105794]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:05 np0005557561.novalocal sudo[105792]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:05 np0005557561.novalocal sudo[105799]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mcqtpvykcdmawgrxcksbtqhocpjnwkcm ; /usr/bin/python3' Dec 12 13:46:05 np0005557561.novalocal sudo[105799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:05 np0005557561.novalocal python3[105801]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:05 np0005557561.novalocal sudo[105799]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:05 np0005557561.novalocal sudo[105806]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xgdqsdsptqddpqtpizuoowvuljcoyekp ; /usr/bin/python3' Dec 12 13:46:05 np0005557561.novalocal sudo[105806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:05 np0005557561.novalocal python3[105808]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:05 np0005557561.novalocal sudo[105806]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:05 np0005557561.novalocal sudo[105813]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cmzzfjleecyhivqkflylxglxmfyljsnp ; /usr/bin/python3' Dec 12 13:46:05 np0005557561.novalocal sudo[105813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:05 np0005557561.novalocal python3[105815]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 12 13:46:05 np0005557561.novalocal sudo[105813]: pam_unix(sudo:session): session closed for user root Dec 12 13:46:05 np0005557561.novalocal sudo[105820]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tewlgpstdaofdsdlubgxtzoluudjroaa ; /usr/bin/python3' Dec 12 13:46:05 np0005557561.novalocal sudo[105820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Dec 12 13:46:06 np0005557561.novalocal python3[105822]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None